Is Physical Security important in the cyber world?

Presented by

Dr Michael H. Goldner, Dean of EC-Council University, EC Council University

About this talk

Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security is the first layer of protection for computers and data. It involves the protection of assets such as personnel, hardware, networks, and data from attacks or natural disasters that cause injury, loss or damage. While the primary concern of any physical security plan is the protection and preservation of human life, a good physical security plan, like its counterpart, an information security plan, is formulated by implementing defense in depth. This 2nd workshop will discuss the various options and interdependent layers that make up that defense in depth physical security plan.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. This BrightTALK channel is an extension of the group and the ISCN website (, featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more