Scott Abel, Tonie Flores, M.K. Palmore, and Keyaan Williams
All systems have weaknesses – places where a determined attacker has the potential to breach security and either disrupt your organization or steal your data. Defending your organization and its digital assets starts with understanding your vulnerabilities. Therefore, cybersecurity planning must begin with a solid understanding of the places where your systems, processes, and staff are vulnerable to attack.
The single weakest part of any system is the people who use it. People are vulnerable to a wide range of exploits, including social engineering attacks such as phishing, which attempt to fool people into revealing passwords or other sensitive information, to insider threats, where employees take advantage of their position to breach security.
Some of the highest profile security breaches, including the hacking of email messages from the Democratic National Committee (DNC) during the 2016 US elections, have happened because users were fooled by a spear phishing attack – an attack that uses a personalized email message to lure a reader into revealing login information or clicking on a link to malware. Once the hackers gained access to the DNC system, they were able to install tools that allowed them to retrieve email messages and other data.
Cyberattacks can come from software, hardware, and people. Business professionals must defend against attacks from all of these sources. Although it may seem out of your control, you are not helpless against cyberattacks. There are things you can do to help protect your digital assets.
Join Scott Abel, The Content Wrangler, for a discussion about cybersecurity with Toni Flores, editor of “The Language of Cybersecurity," M.K. Palmore, Senior Federal Law Enforcement Executive for the FBI, and cyberdefense specialist, Keyaan Williams of Cyber Leadership and Strategy Solutions, LLC. We’ll discuss the current state of cyber warfare and help you understand a variety of vulnerabilities, exploits, defenses and controls.