Hi [[ session.user.profile.firstName ]]

Out Of The Shadows - Can We Address The X Factors In Information Security

Today’s media coverage provides an almost endless litany of stories describing emerging cyber threats, successful breaches and changing attack vectors facing businesses of all sizes, with many involving combinations of social engineering and advanced technological exploits. As a result, organizations and their customers are becoming convinced that even the most well-designed security programs are no match for the capabilities of today’s cyber security underworld.

While advances in technology and processes have provided numerous risk management tools and safeguards that can be employed to help protect an organization’s vital information, their effectiveness is heavily dependent on the consistent application of controls and ethics of the people involved. Too often, organizations underestimate the level and type of risks that can arise from even the most well-intentioned and hard-working individuals, including those directly employed by the organization, contracted to provide third parties services and support, or even interacting with your company as customers. When combined with the potential risk factors brought on by bad actors, it is clear the human factor must be recognized as a key aspect of risk management in today’s complex corporate environments.

This presentation will examine some notorious attacks and explore factors that lead to successful attacks and discuss significant issues and circumstances that lead to successful breaches.

After the session, you will:
•Develop a better understanding of the factors influencing today’s security threat landscape
•Be able to recognize some latent or emerging security threats in your business environment   
•Become aware of some practical approaches and solutions to consider when adjusting your risk management program to reduce your organization’s risk exposure
Recorded Sep 22 2016 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Hainaut, Michael Gerdes
Presentation preview: Out Of The Shadows - Can We Address The X Factors In Information Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Road-Map to Analytics Maturity Dec 8 2016 4:00 pm UTC 60 mins
    Charles Kincaid
    Companies are using analytics to improve operations, reduce risk and increase revenue. The competitive advantage they are gaining comes from recognizing the value and the uniqueness of the data each company owns, instilling analytical processes into the standard operating procedures and building a culture that uses analytics as the standard for decision making. This presentation will introduce the audience to the power of analytics so that they will have the advantage over their competitors.
  • Out Of The Shadows - Can We Address The X Factors In Information Security Recorded: Sep 22 2016 56 mins
    John Hainaut, Michael Gerdes
    Today’s media coverage provides an almost endless litany of stories describing emerging cyber threats, successful breaches and changing attack vectors facing businesses of all sizes, with many involving combinations of social engineering and advanced technological exploits. As a result, organizations and their customers are becoming convinced that even the most well-designed security programs are no match for the capabilities of today’s cyber security underworld.

    While advances in technology and processes have provided numerous risk management tools and safeguards that can be employed to help protect an organization’s vital information, their effectiveness is heavily dependent on the consistent application of controls and ethics of the people involved. Too often, organizations underestimate the level and type of risks that can arise from even the most well-intentioned and hard-working individuals, including those directly employed by the organization, contracted to provide third parties services and support, or even interacting with your company as customers. When combined with the potential risk factors brought on by bad actors, it is clear the human factor must be recognized as a key aspect of risk management in today’s complex corporate environments.

    This presentation will examine some notorious attacks and explore factors that lead to successful attacks and discuss significant issues and circumstances that lead to successful breaches.

    After the session, you will:
    •Develop a better understanding of the factors influencing today’s security threat landscape
    •Be able to recognize some latent or emerging security threats in your business environment   
    •Become aware of some practical approaches and solutions to consider when adjusting your risk management program to reduce your organization’s risk exposure
ManpowerGroup: Experis - Midwest
ManpowerGroup: Experis - Midwest

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Out Of The Shadows - Can We Address The X Factors In Information Security
  • Live at: Sep 22 2016 3:00 pm
  • Presented by: John Hainaut, Michael Gerdes
  • From:
Your email has been sent.
or close