Data security strategies for the discovery, monitoring, and protection of data and privacy AboutThe webinar discusses data security strategies and their relevance to discovering, monitoring, and protecting data and privacy. We will look at the data risk approach to DLP – the next generation of DLP strategies. Safeguarding business data assets in hybrid environments can […]
Reducing Recovery Time Objectives (RTOs); Creating cyber-resistant active data resilience strategies AboutThe webinar discusses strategies for reducing Recovery Time Objectives (RTOs) to minutes in backup and recovery programs using cyber-resistant active data resilience strategies. Cyber-attacks today pose a significant threat to businesses, exposing them to operational risks that can affect their data, processes, and technology. […]

During the last 12 months, Critical Infrastructure (CI) or Critical National Infrastructure (CNI) around the world (and just recently, The Port of Nagoya, the largest and busiest port in Japan, and The Office of the Attorney General and Ministry of Legal Affairs (AGLA), Trinidad and Tobago) have suffered critical cyber-attacks from cyber-criminals, causing operational services […]
Building Security Competence: ISO Certified Training AboutCyber Resilience is very important in today’s organisation’s business continuity program and achieving resilience in cyber can only be achieved through awareness, education and knowledge transfer in any digital transformation initiative plans or life cycle. The series presents critical information exchange on security domains in building cyber resilience capacity […]
In response to (Protecting infrastructure: it’s impossible to always stay alert | Cybernews), protecting Critical Infrastructures (CI) takes a multistep methodology approach to cover all risk areas of operations and the management of those risks as highlighted in many standards: NIST SP 800-82 Rev 2, ISA/IEC 62443, NIST SP 800-37 Rev 2, ISO/IEC 27005, etc. […]
In a recent article written by the Managing Director of CariSec Global Inc. – “Why businesses continue to fail Cyber Security!“, one can understand the need to have matured risk-based Information & Cyber Security Program implemented and operated with the goal of CIAS (Confidentiality, Integrity, Availability and Safety) – all aim in protecting the Organisation […]