Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

[Podcast] Tips for Staying Cyber-Safe While Working from Home

AIIM

On this episode of the AIIM on Air Podcast, we take a look at what you can do to keep your systems safe and your company and private information protected. Information Security AIIM on AirRemote working comes with a number of benefits both for the employee and the employer.

Security Affairs newsletter Round 258

Security Affairs

The best news of the week with Security Affairs. addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. A new round of the weekly newsletter arrived!

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

FOIA 52

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

This week, Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. According to the company, attackers did not obtain sensitive information about defense contracts.

How to become an ISO 27001 lead implementer

IT Governance

It’s an advanced cyber security position that comes with a lot of responsibility. You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies.

Risk 61

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. If you’re thinking about starting a career in cyber security, here are five things you should do. As with most industries, you’re much more likely to get ahead in cyber security if you have experience. Study.

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Better Together in a Digital World: Security and Retention. The e-Records Conference is an educational opportunity for improving electronic records management in Texas government by bringing together records management and information technology staff.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

Anyone with an interest in information security will have encountered ISO 27001 , the international standard that describes best practice for an ISMS (information security management system). It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001. This blog explains why that’s the case, helping you understand how each standard works and the differences between them.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background.

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security.

4 ways ISO 27001 can enhance your business

IT Governance

If your organisation is concerned about information security, it should have an ISO 27001 -compliant information security management system (ISMS) in place. ISO 27001 helps businesses become more productive by clearly setting out information risk responsibilities.

Sales 54

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

Such information on the wrong hands can be used for misrepresentation or identity theft. Most IT specialists, board directors, and C-suite executives aren’t too familiar with matters to do with information security.

UK ICO Releases Code on Data Sharing

Hunton Privacy

On May 11, 2011, the UK Information Commissioner’s Office (the “ICO”) published a new statutory code of practice on the sharing of personal data. The UK Information Commissioner, Christopher Graham, said, “[f]ew would argue that sharing data can play an important role in providing an efficient service to consumers in both the public and private sector.

Paper 40

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. However, some cyber security experts believe the skills shortage is a “myth”.

Risk 54

Wednesday LTNY 2020 Sessions: eDiscovery Trends

eDiscovery Daily

There’s still time to check out the show if you’re in the New York area with a number of sessions available and over 158 exhibitors providing information on their products and services, including our company, CloudNine at booth #3000 in America’s Hall 2.

What did you do for European Cyber Security Month?

IT Governance

Throughout October, cyber security experts have been helping Europeans understand the importance of effective information security practices as part of Cyber Security Month. What should you remember about Cyber Security Month? Security Summit North.

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Today is the last day to check out the show if you’re in the New York area with a number of sessions available and over 160 exhibitors providing information on their products and services, including our company, CloudNine at booth #310-312.

Cloud 39

Can Enterprises execute a GRC Movement?

Security Affairs

Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world. GLOBAL CYBER SECURITY MARKET. Enterprises can outsource cyber security, but not risk. If yes then what kind of use cases?

Risk 93

Legaltech 2019 Preview Edition: eDiscovery Trends

eDiscovery Daily

Next week during the show, I’ll cover the sessions each day that relate to eDiscovery, Information Governance, Cybersecurity and Data Privacy to give you a complete sense of options. Custodian spoliation of electronic information. OK, everybody gets hung up on Legalweek vs. Legaltech®.

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

It begins with fact-finding: gathering information, learning the institution, meeting with stakeholders from various functions. These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). We made early acquaintances with Legal and Information Security leaders.

Does IT matter… in Australian supermarkets?

ChiefTech

According to Woolworth''s CIO they selected Google Apps because: "Simplicity and ease of use of the solution, the support for mobility, activity-based working and bring-your-own-device, security and the overall value proposition,". My memories of interactions with Woolworths in the past was a company with very strict information security policies, so either an IT changing of the guard has taken place or they are confident that Google (and Yammer) can meet their standards.

Download IGI’s Whitepaper: Ameritas Leverages Technology For Improved Information Governance

IGI

This publication was written by the Information Governance Initiative as part of our ongoing series exploring issues, strategies, and techniques related to information governance. More information about Active Navigation is available at www.activenavigation.com. Given the multi-disciplinary nature of Information Governance (IG), it can sometimes feel like an amorphous topic. headquartered in Lincoln, Nebraska, clearly makes such a case. About this Publication.