Webinar: Cyber Security, Liability, & Insurance

On this CTO Nation webinar, we focused on cyber security as it relates to business risk, liability, and insurance. Every business has a responsibility to keep their data secure and to protect their customers’ data. The risk of exposure from a breach is keeping many CEOs up at night.Is your business taking the necessary steps?Do you know what liability you have?What if your vendors, franchisees or business partners fail to protect your customers’ data?Do you know how to respond if a breach occurs?
Watch Now

Spotlight

ELECTRIC power systems and automation systems include
process control and supervisory control and data
acquisition systems (SCADA) that operate safe, reliable, and
efficient physical processes for the energy system [1]. These
systems are connected via a highly automated network. A
variety of communication networks are interconnected to the
electric grid for the purpose of sensing, monitoring, and
control. Computer and communication devices are widely
installed in power plants, substations, energy control centers,
company headquarters, regional operating offices, and large
load sites. These devices and systems are increasingly
networked and complex.


OTHER ON-DEMAND WEBINARS

"Fortinet's Cyber Threat Assessment - For Once, Get What You Don't Pay For"

Fortinet

"Every organization can use an extra set of eyes – Audits should be a regular part of any security plan, but they can be expensive and time consuming. Enter the Fortinet Cyber Threat Assessment, a free evaluation of your existing security infrastructure that helps you: •Evaluate potential security risks from the edge to the endpoint and everywhere in between •Determine areas where security infrastructure is compromising performance and how to eliminate bottlenecks while still protecting your network •Find often overlooked vulnerabilities and learn about risks both within and outside your organization."
Watch Now

How to Avoid Social Engineering Attacks

You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker
Watch Now

CEO's Role in the Fight Against Fraud

bankinfosecurity

In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communicate it to all levels of the organization - businesses can sustain significant reputational and financial damage.
Watch Now

Is Physical Security important in the cyber world?

Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security is the first layer of protection for computers and data. It involves the protection of assets such as personnel, hardware, networks, and data from attacks or natural disasters that cause injury, loss or damage. While the primary concern of any physical security plan is the protection and preservation of human life, a good physical security plan, like its counterpart, an information security plan, is formulated by implementing defense in depth. This 2nd workshop will discuss the various options and interdependent layers that make up that defense in depth physical security plan.
Watch Now

Spotlight

ELECTRIC power systems and automation systems include
process control and supervisory control and data
acquisition systems (SCADA) that operate safe, reliable, and
efficient physical processes for the energy system [1]. These
systems are connected via a highly automated network. A
variety of communication networks are interconnected to the
electric grid for the purpose of sensing, monitoring, and
control. Computer and communication devices are widely
installed in power plants, substations, energy control centers,
company headquarters, regional operating offices, and large
load sites. These devices and systems are increasingly
networked and complex.

resources