Protecting People | Information and Systems – a Growing Problem
1
MES - Why cybercrime is here to stay – a profitable business model
2
MES - The macro-economic cost of cybercrime
3
MES - The macro-economic cost of cybercrime
4
MES - The role of governments and regulation
5
MES - The foundational elements of security
6
MES - The cybersecurity talent shortage
The Human Side of Cybersecurity
1
MES - People exploiting people
2
MES - The three types of insider threats
3
MES - The three types of insider threats
Anatomy of an Attack
1
MES - Understanding the risk from targeted attacks
2
MES - Stages of an attack
3
MES - Extortion
4
MES - Extortion
5
MES - Stealing information
6
MES - System disruption or destruction
7
MES - Attackers for hire
8
MES - Attackers for hire
Protecting People | Information and Systems with Timeless Best Practices
1
MES - The most important threat vector
2
MES - The most important threat vector
3
MES - Time-honored best practices that could stop most breaches
4
MES - Capabilities necessary in the remote world
5
MES - The role of human behavior
6
MES - The everything, everywhere world
Protecting against Common Attacks by Partnering with End Users
1
MES - A framework for effective training
2
MES - Making your people your partners
3
MES - Making your people your partners
4
MES - Tabletop exercises
5
MES - Training people to protect against common hacking techniques
Information Security for a Changing World
1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints
Information Security for a Changing World
1
MES - Frames of reference
2
MES - Challenges with the traditional information security model
3
MES - Protecting information
4
MES - Securing networks and workloads – past, present, and future
5
MES - Securing identities and granting access
6
MES - Securing endpoints
Difficulty Securing the Modern Enterprise (with Solutions!)
1
MES - Cybersecurity talent shortage
2
MES - Cybersecurity talent shortage
3
MES - Too much technology with too little process
4
MES - Too much technology with too little process
5
MES - What are we trying to accomplish?
6
MES - What are we trying to accomplish?
7
MES - Lack of continuing education
Harnessing Automation Opportunities
1
MES - Defining automation opportunities
2
MES - Defining automation opportunities
3
MES - Gathering data and applying context
4
MES - Gathering data and applying context
5
MES - Testing the system
6
MES - How attackers can leverage automation
Cybersecurity at Home
1
MES - Protecting children and teaching them about online safety
2
MES - Password managers
3
MES - Multifactor authentication
4
MES - Password complexity and why it matters
5
MES - Password complexity and why it matters
6
MES - Stop publishing your information!
Be the first to add a review.
Please, login to leave a review