In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
Cybersecurity is at the top of the agenda in board rooms around the world. In this presentation, Retired Brigadier Gen. Greg Touhill, the first Chief Information Security Officer of the United States Government, will discuss lessons learned during his military and federal service. Discover how properly executing...
As the attackers evolve their techniques, so does the requirement to change the way we defend and prevent these attacks we read about in the headlines almost daily. Technology alone will not solve this. It will require the right mix of security technologies, together with processes to protect our privacy, and people...
The Obama administration has implemented a number of cybersecurity and privacy initiatives and policies aimed at making IT more secure for the federal government and the private sector, including the cybersecurity framework, National Strategy for Trusted Identities in Cyberspace, employing encryption and sharing cyber...
The Department of Homeland Security is at the nexus of the voluntary federal program in which the private sector shares cyber threat information with the government and with other businesses. To encourage participation, Congress last year changed federal law to furnish businesses with liability protections from...
The cyber-defense challenge is an evolving and complex one for both public entities and private industry. States, in particular, have become a testing ground for new approaches and best practices. In this session, you'll hear how the Commonwealth of Virginia is approaching cybersecurity; how the Office of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.