Mitigating Cyber Risks With Security Ratings: A Case Study with University of Arizona

BITSIGHt

The Higher Education sector is a large target for cyberattacks because of their research in science and technology that can be leveraged for commercial gain. However, colleges and universities often have unique requirements and specific challenges to securing their networks.In this webcast Stephen Boyer, of BitSight Technologies and Christian Schreiber of University of Arizona, will discuss:The specific challenges that universities and colleges face in mitigating cyber risk,How threats like peer to peer file sharing present greater risk to this sector,How universities can use BitSight Security Ratings to mitigate cyber risk and improve their security posture.
Watch Now

Spotlight

A global change in culture has been materializing recently in the energy automation business for electric utilities with regards to cyber security. This has accelerated rapidly in the last three years, with the culmination of new standards and mature methodologies being deployed for the energy market. Electric utilities operate critical infrastructure in order to secure the reliability of the energy supply. Therefore the utility is focused on the uninterrupted operation and availability of the different components of the infrastructure from the control centers, substations, RTUs to the field devices. Former energy automation systems (EAS) have not been developed with cyber security in mind. They have been operated as an “island” with “private” communication connections to other systems. Starting with the introduction of internet technology, EASs became increasingly more interconnected and emerged as targets for “hacker” groups to attack the infrastructure. The process of awareness for cyber security issues started initially very slowly. The first attacks / incidents were not widely published and therefore not prevalently known. Nowadays the awareness of cyber security issues is growing due to the importance of energy infrastructure to be constantly in operation. The awareness of all the related cyber security topics needs to be extended in future to guarantee further smooth operation of the critical energy infrastructure. The operational failure of an EAS can have an extremely negative impact for industry, the general public and governments. Industry and households increasingly depend on electrical energy. Nobody will accept a blackout due to a cyber security attack.


OTHER ON-DEMAND WEBINARS

Trends in Social Engineering, and Automated Mitigation

ZapFraud

The successful deployment of improved authentication and encryption technologies is increasingly forcing scammers to exploit the weakest link of security: the end user. Consequently, social engineering, such as Business Email Compromise (BEC), is on a rapid rise. In this talk, I will explain how scammers are exploiting the blind spots in traditional security technologies and take advantage of the psychology of their intended victims. I will also describe how to automatically identify social engineering attacks, with a focus on BEC.
Watch Now

Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls

Fortinet

No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.
Watch Now

What GDPR Means for Your Security

Proofpoint

For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization. Join us to hear how to. Discover and classify personal data. Protect all personal data by developing and implementing appropriate security controls. Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
Watch Now

Double Your Revenue with Backup and DRaaS

Unitrends MSP

The information age is upon us and your clients are grappling with how to effectively deal with the data explosion. They need help in efficiently backing up critical data and ensuring they can quickly recover from disasters whether they be natural or inflicted by humans. Elite IT Solution and Managed Service Providers are selling industrial strength back-up and DRaaS solutions that are addressing the situation, mitigating the risk and complexity of ensuring error-free backups that can be restored quickly in the event of a disaster.
Watch Now

Spotlight

A global change in culture has been materializing recently in the energy automation business for electric utilities with regards to cyber security. This has accelerated rapidly in the last three years, with the culmination of new standards and mature methodologies being deployed for the energy market. Electric utilities operate critical infrastructure in order to secure the reliability of the energy supply. Therefore the utility is focused on the uninterrupted operation and availability of the different components of the infrastructure from the control centers, substations, RTUs to the field devices. Former energy automation systems (EAS) have not been developed with cyber security in mind. They have been operated as an “island” with “private” communication connections to other systems. Starting with the introduction of internet technology, EASs became increasingly more interconnected and emerged as targets for “hacker” groups to attack the infrastructure. The process of awareness for cyber security issues started initially very slowly. The first attacks / incidents were not widely published and therefore not prevalently known. Nowadays the awareness of cyber security issues is growing due to the importance of energy infrastructure to be constantly in operation. The awareness of all the related cyber security topics needs to be extended in future to guarantee further smooth operation of the critical energy infrastructure. The operational failure of an EAS can have an extremely negative impact for industry, the general public and governments. Industry and households increasingly depend on electrical energy. Nobody will accept a blackout due to a cyber security attack.

resources