Protecting People | Information and Systems – a Growing Problem
1
MES – Why cybercrime is here to stay – a profitable business model
2
MES – The macro-economic cost of cybercrime
3
MES – The role of governments and regulation
4
MES – The foundational elements of security
5
MES – The cybersecurity talent shortage
The Human Side of Cybersecurity
1
MES – People exploiting people
2
MES – The three types of insider threats
Anatomy of an Attack
1
MES – Understanding the risk from targeted attacks
2
MES – Stages of an attack
3
MES – Extortion
4
MES – Stealing information
5
MES – System disruption or destruction
6
MES – Attackers for hire
Protecting People | Information and Systems with Timeless Best Practices
1
MES – The most important threat vector
2
MES – Time-honored best practices that could stop most breaches
3
MES – Capabilities necessary in the remote world
4
MES – The role of human behavior
5
MES – The everything, everywhere world
Protecting against Common Attacks by Partnering with End Users
1
MES – A framework for effective training
2
MES – Making your people your partners
3
MES – Training people to protect against common hacking techniques
4
MES – Tabletop exercises
Information Security for a Changing World
1
MES – Frames of reference
2
MES – Challenges with the traditional information security model
3
MES – Protecting information
4
MES – Securing networks and workloads – past, present, and future
5
MES – Securing identities and granting access
6
MES – Securing endpoints
Difficulty Securing the Modern Enterprise (with Solutions!)
1
MES – Cybersecurity talent shortage
2
MES – Too much technology with too little process
3
MES – What are we trying to accomplish?
4
MES – Lack of continuing education
Harnessing Automation Opportunities
1
MES – Defining automation opportunities
2
MES – Gathering data and applying context
3
MES – Testing the system
4
MES – How attackers can leverage automation
Cybersecurity at Home
1
MES – Protecting children and teaching them about online safety
2
MES – Password managers
3
MES – Multifactor authentication
4
MES – Password complexity and why it matters
5
MES – Stop publishing your information!
Be the first to add a review.
Please, login to leave a review