Never before has cybersecurity presented such a complex challenge. IT infrastructures now consist of employee desktop PCs and Macs, servers and storage platforms, multiple private and public clouds, on-premises data centers, and hundreds to thousands of mobile devices and apps.
The looming shadow of terrorism is pervasive. The recent suicide attack that targeted a music concert in Manchester, UK; the vehicle attack in London, UK, two months prior; and compounded further by regular images across the media of marauding attacks in cities such as Paris and Berlin.
As the national conversation regarding violence in the workplace suggests a heightened awareness stemming from increased media coverage, recent studies suggest there may be statistical evidence supporting this perceived frequency.
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.
Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training. Read More
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.