Cyber Security through Information Resilience Workshop
Implementing a holistic Information Resilience strategic approach builds an information security architecture that is both more effective and sustainable; one that increases security while decreasing cost. Deploying Information Resilience’s “Implement Once, Comply Many” strategy strengthens systems to be more resistant to penetration and restricts the cyber criminals’ access, mitigating or reducing risk and its impact.
- Data from Global Cybersecurity Landscape Research
- Review Cybersecurity global harmonization efforts taking place with the NIST Framework
- Developing and Expanding a Cyber Security Strategy that includes IoT
- Detection practices: Looking at Tomorrow’s threats today
- Leading edge technology in information sharing
- Increasing Cyber Security Awareness
***Real and practical best practices will be discussed throughout the day, which you can take away to consider in your organization.
As more sensitive and confidential information is moved to the cloud, it becomes more vulnerable to attack. Last year witnessed an unprecedented number of data breaches and cyberattacks by external parties. 2018 is predicted to be worse.
Research indicates that security systems are failing, not so much for technical reasons, but from misplaced resources that actually create greater technological complexity. Rather than enhancing security, this complexity is paving new avenues and pathways for cyber criminals to follow.
Dr. Ron Ross, Fellow at the National Institute of Standards and Technology, in his address to the Commission on Enhancing National Cybersecurity, stated “Our fundamental cybersecurity problems today can be summed up in three words—too much complexity. Put another way, you cannot protect that which you do not understand. Adversaries view our critical infrastructure and our thriving businesses and industry as a target of opportunity…”
The most common reason for a breakdown in security is the organization’s overall culture. There must be an overarching strategy in place that focuses on developing critical competencies, along with solid, consistent, well-managed processes woven throughout the enterprise that creates an understanding and thereby a culture of security.