Live Webinar on Cybersecurity By Angela Bazigos
01:00 PM EDT | 10:00 AM PDT | 12:00 PM CDT Duration 90 Minutes
Webinar Includes : All the training handouts , Certificate by the Speaker ,Q/A and 90 Min Live Webinar
"Hear By Angela Bazigos who recently quoted in Wall Street Journal for using training to bring regulatory compliance to the Boardroom"
When hackers breach cybersecurity defenses, the risks to enterprises are enormous.
It’s no secret that managers across North America and Europe have been marshaling forces for digital transformation in a high-stakes battle to ward off ambitious insurgents, maintain market share and address the changing demands of today’s customers. This is a once-in-a-generation challenge for any business leader, but it’s not the whole story. behind the scenes, a fourth imperative is being added to the list of transformation considerations—combating modern cybercriminal
Why should you attend
When hackers breach cybersecurity defenses, the risks to enterprises are enormous. Risks range from financial losses and damage to corporate reputations to exposure of intellectual property and the release of sensitive customer information. One worry encapsulates all these perils: The biggest fear of enterprises is seeing their companies on the front page of media headlines because they have had a massive breach.
This concern is well-founded. Headline grabbing breaches have become routine in recent months, and corporations are paying the price. The average price of a data breach now stands at about $4 million. But the financial damage from a massive breach can be much higher. The fallout for one large retailer is estimated at $252 million. Financial information, customer information, intellectual property and other information continue to be vulnerable to a sophisticated army of global cyber-thieves—many of whom are backed by national governments— attack your computers.
Former Cisco CEO John Chambers was famously quoted as saying that “There are two types of companies: those that have been hacked, and those who don’t know they have been hacked.” Implicit in that statement is the notion that every organization, whether it knows it or not, has suffered a breach at some point; the difference between the two groups is that the organizations that know they have been breached are in a position to do something about it.
Data breaches will happen to your company. The question is: Will You Be Ready?
This webinar will explain in simple terms what cybercrime is and how cybersecurity can be used to fight cybercrime. It will show you how to close the security gaps that arise as your organization embraces digital transformation
1. New Technology and New Challenges
2. Innovation vs Security
3. Cybersecurity Trends
a. IoT / BoT - BotNet of Things
b. Rise of Insider Threat
c. Data Security for the Big and Small
d. SSL: More of a Problem than a Solution?
e. Ransomware / Blackmail – A Flourishing Business
4. Waging Cyber Warfare
b. History of Cyber Crime
c. Categories of Cybercrime
d. Types of Cybercrime
5. Cyber Defense
a. Basics of Cybersecurity
b. A New Security Model
c. Cybersecurity Strategy
i. Securing Mission Critical Assets
ii. From Safeguarding Applications to Securing Data
iii. Organizational Effectiveness in Cybersecurity
iv. Catching the perpetrators
i. The People Imperative
ii. Create a Culture of Security
i. Threat Security
ii. Asset Security
iii. Information Security
6. Moving forward – future trends and expectations
Who will Benefit
Industries who can attend
This 90-minute online course is intended for professionals in the Medical Device,Biotechnology,Pharmaceutical,Healthcare,Finance,Manufacturing,Retail Industry. Although not presently stated in the draft , the same guide could be used by FDA Regulated Industries personnel.