Cyber Security Day
As more sensitive and confidential information is moved to the cloud, it becomes more vulnerable to attack. Last year witnessed an unprecedented number of data breaches and cyberattacks by external parties. 2018 is predicted to be worse.
Research indicates that security systems are failing, not so much for technical reasons, but from misplaced resources that actually create greater technological complexity. Rather than enhancing security, this complexity is paving new avenues and pathways for cyber criminals to follow.
Dr. Ron Ross, Fellow at the National Institute of Standards and Technology, in his address to the Commission on Enhancing National Cybersecurity, stated “Our fundamental cybersecurity problems today can be summed up in three words—too much complexity. Put another way, you cannot protect that which you do not understand. Adversaries view our critical infrastructure and our thriving businesses and industry as a target of opportunity…”
The most common reason for a breakdown in security is the organization’s overall culture. There must be an overarching strategy in place that focuses on developing critical competencies, along with solid, consistent, well-managed processes woven throughout the enterprise that creates an understanding and thereby a culture of security.
Implementing a holistic Information Resilience strategic approach builds an information security architecture that is both more effective and sustainable; one that increases security while decreasing cost. Deploying Information Resilience’s “Implement Once, Comply Many” strategy strengthens systems to be more resistant to penetration and restricts the cyber criminals’ access, mitigating or reducing risk and its impact.
Participants will learn:
- The economics of developing and implementing an information security management system.
- Review research data from some of the worst breaches and associated costs.
- Lessons learned from the worst breaches and cost effective, internationally accepted best practices solutions that mitigate the risk.
- How to reduce complexity and increase security.
- Steps to a holistic approach to information resilience.
Upcoming Course Dates
The venues for scheduled courses are tentative until receipt of course
confirmation from BSI.