Second Order Cyber Risk: Exposing Your Blind Spots

Logo
Presented by

Peter Hay, Lead Instructor, SimSpace; Brandon Dunlap, Moderator

About this talk

The very activities that cybersecurity teams do to make their organizations safe can create additional risk for the organization. Defenders can unintentionally create new ways for attackers to target their organization through inadvertently introducing new vulnerabilities, placing too much trust in their security strategy, ignoring alert fatigue, and by making their mitigation activities too predictable. During this session, we will: • Explore why blindly applying vendor patches may not always be the best strategy. • See examples of how overconfidence in any single line of defense can be dangerous. • Identify opportunities to streamline incident alerts and monitoring so critical notifications are not missed. • Learn why following an incident response playbook may not always be in your best interest. Join us on June 30, 2022, at 1:00 p.m. Eastern/10:00 a.m. Pacific when SimSpace and (ISC)² will discuss the four types of second-order cyber risk and offer practical advice on best practices that form a continuous improvement approach to improve overall cyber hygiene while minimizing second-order cyber risks.
Related topics:

More from this channel

Upcoming talks (12)
On-demand talks (444)
Subscribers (135662)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.