Today’s conference breakfast sponsored by MegaPath and Fortinet covers risk, compliance and security. Beginning in the 2000’s cybercrime from organized cyber-gangs to the sale of serviced such as bonnet rentals, malware distribution and technical support via social networks has become increasingly more complex!
Threats (advanced, persistent threats) are out there… And not just for notoriety, but for financial gain. What can be done to decrease your exposure to these risks? Malicious activity can occur within trusted applications…
Navigating the security landscape: connection security; application security and content security. Determine what your needs are - don’t let a vendor tell you what they are! whatever your needs, make sure you have complete content protection… Layer your security so that if one layer misses a threat another will catch it. The earlier you block the threat, the easier it is to control.
Look at all of your third party solutions (fixing one problem at a time) and try to consolidate… Most solutions (even from the same company) are not integrated.
Main thing to keep in mind: do what makes sense for your company! Review your environment and take the appropriate steps to mitigate risk based on your risk tolerance.
What things do you do to secure your company’s data?