Security 3.0: Looking Out For The Silent Stakeholders
Posted by EdmontonPMSep 22
Live Webinar September 28th, 2016 1:00 PM – 2:00 PM EDT
Activity Type: Education – Course or Training 1 Hour 1 PDU free
Provider: O’Reilly
Information security has long focused on looking out for the needs of the business.
In the Internet age, however, businesses regularly put consumers at risk by not adequately protecting their information.
Times are changing, and focusing security policies around limiting liability for the company isn’t adequate.
While there has been very limited liability for a business if the personal information of the consumer, the silent stakeholder, is stolen, that will soon change; the Federal Trade Commission now has the power to pursue companies that are not adequately protecting consumer information.
Businesses need to adjust their perception of what they are protecting and why.
Ric Messier explores the concept of risk in relation to information assets. By the end of this webcast, you’ll be able to appropriately determine protections for assets that are most at risk.
Topics include:
- Security 2.0: Policy and compliance
- Metrics
- Security 3.0: Understanding the landscape
- Modern adversaries
- Monetizing the victim
- Data protection
- Data loss prevention
- Ethical obligations
Presenter: Ric Messier (LinkedIn profile) GSEC, CEH, CISSP had his first experience on a global network called the BITNET in the early 1980s. Since then he has been hooked on security after unexpectedly exploiting a hole in a mail program on an IBM mainframe. In the 90’s Ric spent several years working on VOIP solutions and quickly became an expert in forensic investigations. Ric regularly consults to law enforcement on their investigations. Ric lead a team developing a managed intrusion detection system offering at Genuity and provided security expertise to the implementation and use of session border controllers in their VoIP networ . With Ric’s expertise he is the defacto expert in performing penetration tests on products!
Click to register for:
Security 3.0:
Looking Out For The Silent Stakeholders
0 | 0 | 1.0 |
Technical Project Management | Leadership | Strategic & Business Management |
NOTE: For PMI® Audit Purposes – Print Out This Post! Take notes on this page during the presentation and also indicate the Date & Time you attended. Note any information from the presentation you found useful to your professional development and place it in your audit folder.
Leave a Reply