Modern Enterprises Security

Protecting People | Information and Systems – a Growing Problem

1
MES - Why cybercrime is here to stay – a profitable business model
2
MES - The macro-economic cost of cybercrime
3
MES - The macro-economic cost of cybercrime
4
MES - The role of governments and regulation
5
MES - The foundational elements of security
6
MES - The cybersecurity talent shortage

The Human Side of Cybersecurity

1
MES - People exploiting people
2
MES - The three types of insider threats
3
MES - The three types of insider threats

Anatomy of an Attack

1
MES - Understanding the risk from targeted attacks
2
MES - Stages of an attack
3
MES - Extortion
4
MES - Extortion
5
MES - Stealing information
6
MES - System disruption or destruction
7
MES - Attackers for hire
8
MES - Attackers for hire

Protecting People | Information and Systems with Timeless Best Practices

1
MES - The most important threat vector
2
MES - The most important threat vector
3
MES - Time-honored best practices that could stop most breaches
4
MES - Capabilities necessary in the remote world
5
MES - The role of human behavior
6
MES - The everything, everywhere world

Protecting against Common Attacks by Partnering with End Users

1
MES - A framework for effective training
2
MES - Making your people your partners
3
MES - Making your people your partners
4
MES - Tabletop exercises
5
MES - Training people to protect against common hacking techniques

Information Security for a Changing World

1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints

Information Security for a Changing World

1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints

Difficulty Securing the Modern Enterprise (with Solutions!)

1
MES - Cybersecurity talent shortage
2
MES - Cybersecurity talent shortage
3
MES - Too much technology with too little process
4
MES - Too much technology with too little process
5
MES - What are we trying to accomplish?
6
MES - What are we trying to accomplish?
7
MES - Lack of continuing education

Harnessing Automation Opportunities

1
MES - Defining automation opportunities
2
MES - Defining automation opportunities
3
MES - Gathering data and applying context
4
MES - Gathering data and applying context
5
MES - Testing the system
6
MES - How attackers can leverage automation

Cybersecurity at Home

1
MES - Protecting children and teaching them about online safety
2
MES - Password managers
3
MES - Multifactor authentication
4
MES - Password complexity and why it matters
5
MES - Password complexity and why it matters
6
MES - Stop publishing your information!

Be the first to add a review.

Please, login to leave a review
Morden Enterprise Security
30-Day Money-Back Guarantee

Includes

Full lifetime access
Access on mobile and TV

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Modern Enterprises Security
Price:
Free