Peter Hay, Lead Instructor, SimSpace; Brandon Dunlap, Moderator
The very activities that cybersecurity teams do to make their organizations safe can create additional risk for the organization. Defenders can unintentionally create new ways for attackers to target their organization through inadvertently introducing new vulnerabilities, placing too much trust in their security strategy, ignoring alert fatigue, and by making their mitigation activities too predictable. During this session, we will:
• Explore why blindly applying vendor patches may not always be the best strategy.
• See examples of how overconfidence in any single line of defense can be dangerous.
• Identify opportunities to streamline incident alerts and monitoring so critical notifications are not missed.
• Learn why following an incident response playbook may not always be in your best interest.
Join us on June 30, 2022, at 1:00 p.m. Eastern/10:00 a.m. Pacific when SimSpace and (ISC)² will discuss the four types of second-order cyber risk and offer practical advice on best practices that form a continuous improvement approach to improve overall cyber hygiene while minimizing second-order cyber risks.