Description
No entity (organization, nation, or individual) is exempt from cyber security attacks. These attacks have been used to steal identities, paralyze cities, cause reputational damage, and have cost trillions of dollars to the global economy impacting the consumer, nations, and organizations. This brief session will inform participants of what the top cyber security threats are, who is in engaging in these types of crimes, why, and how are they succeeding. This session will inform the participants on what they can do to identify vulnerabilities within their organizations and reduce the risk of becoming a victim. We will also discuss what activities, effective processes, and investments participants should focus on to continuously mitigate the risk associated with this continuous threat.
Learning Objectives:
- Understand the threat actor (hacker) methodology and assess risks from this perspective
- Understand what the top cyber security threats and attacks are against individuals, organizations, and nations (e.g. phishing, ransomware, malware, credential theft, Man-in-the-Middle, WiFi, etc.)
- Assess the actions that mitigate cyber security risks within the participants' environments
- Determine effective cyber security controls and investments to further reduce residual risks
Speaker(s):
- Michael
Davenport,
CISSP, CISM, CEH, CPT, CCFE,
President,
TrilogySecurity
- Wendye
D. Mingo,
Ph.D.,
Managing Director, Information Technology,
The Kresge Foundation
Category:
General Session (Online)