Is Physical Security important in the cyber world?

Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security is the first layer of protection for computers and data. It involves the protection of assets such as personnel, hardware, networks, and data from attacks or natural disasters that cause injury, loss or damage. While the primary concern of any physical security plan is the protection and preservation of human life, a good physical security plan, like its counterpart, an information security plan, is formulated by implementing defense in depth. This 2nd workshop will discuss the various options and interdependent layers that make up that defense in depth physical security plan.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

MCAFEE + CISCO THREAT RESPONSE COLLABORATION & INTEGRATION

Dyntek

Today, organizations are faced with increasingly complex systems driven by McAfee + Cisco-Threat Response Webinar Blogdissolving enterprise boundaries, ubiquitous user data in the cloud and an increasing volume and sophistication of cyber attacks across multiple vectors. Siloed cyber security solutions only add complexity and restrict your ability to protect and respond to advanced attacks, while increasing costs and management overhead.
Watch Now

ON-DEMAND WEBINAR Why Cyber-Physical Convergence Really Matters

Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it really mean and why does it matter? In this session we’ll discuss: The evolution of converged security Cyber-physical security convergence vs. security convergence Preparing for, and protecting against, cyber-
Watch Now

3 Steps to Combat Ransomware in K-12 and Public Sector

The recent cyber attack on Los Angeles Unified School District is not unique. Public schools and universities are targets for ransomware, that can cripple your infrastructure and expose sensitive data. Not having proper security is a risk you can’t afford. But with tight budgets and limited personnel, finding the right security can be an uphill battle.
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now