See Richard Hollis in action as he delivers an informative brief of the essential elements needed in designing an effective information security awareness program for your business.
The session covers the four pathways that need to be taken and includes the way to identify the KPIs required to actually measure the success of the program and verify the real change in your business culture.
Gross revenues for the online adult entertainment industry exceeded $150 billion dollars last year from transactions conducted over more than 5 million websites offering adult content. Every second $3,075.64 is being spent on adult entertainment websites. The annual revenues from this industry alone exceed the top ten online companies in the world combined (Microsoft, Google, Amazon, E-Bay, Yahoo, Dell etc).
This industry is credited for creating the very financial model used by virtually everyone doing business on the Internet today in addition to being primarily responsible for launching the very technologies we now come to expect from service providers from broadband to streaming media. This is an industry that understands the financial benefits of aligning their technology to their business objectives.
The industry is also reputed to be the largest purveyor of SPAM, viruses, Trojans, worms, adware and spyware. This fact along with the product it sells and enormous revenue it generates make it an extremely high value target for crackers, fraudsters, organised crime and vigilante groups. And yet, we never hear about a breach to their systems do we? Why is that? What is their secret? What do they know about data security that other industries don’t?
The presentation covers the statistics of the industry and then explains the ten basic information security principles that online adult entertainment providers implement to ensure the security integrity of their systems. The material is based upon actual case studies and interviews with Directors of online adult entertainment provider companies.
What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:
Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.
This presentation provides a clear, simple and useable perspective on big data to include:
Educating you in Cyber Security, one webcast at a time
We are an elite group of product-independent, information governance, risk, and compliance management professionals and the forerunners in the design and delivery of effective business information and communication technology risk and security solutions.