Data security strategies for the discovery, monitoring, and protection of data and privacy AboutThe webinar discusses data security strategies and their relevance to discovering, monitoring, and protecting data and privacy. We will look at the data risk approach to DLP – the next generation of DLP strategies. Safeguarding business data assets in hybrid environments can […]
Reducing Recovery Time Objectives (RTOs); Creating cyber-resistant active data resilience strategies AboutThe webinar discusses strategies for reducing Recovery Time Objectives (RTOs) to minutes in backup and recovery programs using cyber-resistant active data resilience strategies. Cyber-attacks today pose a significant threat to businesses, exposing them to operational risks that can affect their data, processes, and technology. […]
Building Security Competence: ISO Certified Training AboutCyber Resilience is very important in today’s organisation’s business continuity program and achieving resilience in cyber can only be achieved through awareness, education and knowledge transfer in any digital transformation initiative plans or life cycle. The series presents critical information exchange on security domains in building cyber resilience capacity […]
In response to (Protecting infrastructure: it’s impossible to always stay alert | Cybernews), protecting Critical Infrastructures (CI) takes a multistep methodology approach to cover all risk areas of operations and the management of those risks as highlighted in many standards: NIST SP 800-82 Rev 2, ISA/IEC 62443, NIST SP 800-37 Rev 2, ISO/IEC 27005, etc. […]
The following Cyber Intelligence article was written and appeared in the Top Cyber News Magazine – April 2022 Edition