Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Star One Public Relations
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Cybersecurity Boardroom Workshop 2015 to Bring Critical Cyber Security Lessons for Boards and CEOs

% of readers think this story is Fact. Add your two cents.


Building off of the momentum of past successful workshops, Golden Networking brings Cybersecurity Boardroom Workshop 2015 (http://www.CybersecurityBoardroomWorkshop.com), seminar specifically designed for board members and senior executives of public and private firms looking for new ways to gain and maintain competitive business advantage.

New York, NY, USA (January 20, 2015) — In the days prior to Thanksgiving 2013, malware designed to steal credit card data at Target was surreptitiously installed. According to Bloomberg BusinessWeek, the company had installed a malware detection tool. Target had specialists in Bangalore to monitor its computers around the clock. Two days after Thanksgiving, the malware was spotted. The team in India got an alert and flagged Target’s security managers. And then?

Nothing happened. Target’s alert system had worked effectively. But then, Target stood by as 40 million credit card numbers flowed out of its computers. Only a few months later, CEO Gregg Steinhafel and CIO Beth Jacob were both out of the company.

Cybersecurity has become widely recognized as a critical corporate challenge. Boards and senior managements are putting it on their agenda, categorizing cybersecurity not as a compartmentalized risk for the information technology team, but as strategic and enterprise-wide.

However, a security program is only as strong as its weakest link. While a survey by the Institute of Internal Auditors found 58% of board members felt they should be actively involved in cybersecurity preparedness, only 14% said they were actively involved. Unfortunately, 65% also said their perception of the risk their organizations faced had increased.

Board members and senior managers need to become more educated about the topic to be able to ask questions that are strategic yet granular enough to address company-specifics. To go further, it will be imperative to join Cybersecurity Boardroom Workshop 2015 (http://www.CybersecurityBoardroomWorkshop.com), the first seminar targeted at strategic and executive leaders for whom cybersecurity readiness is a relatively new yet critically important area to be intelligently conversant about.

Cybersecurity Boardroom Workshop 2015 is specifically designed for board members and senior executives of public and private firms looking for new ways to gain and maintain competitive business advantage. Business executives with responsibility for IT, finance, compliance, risk management and procurement as well as entrepreneurs and innovators are welcome.

By the end of Cybersecurity Boardroom Workshop 2015, to be held in Dubai, March 8-9, Hong Kong, March 12-13, Seoul, March 19-20, Singapore, March 26-27, London, 9-10 April, and New York City, April 16-17, participants will:

• Understand enterprise cybersecurity and the impact on shareholder value in the short and long term
• Identify immediate security needs for the organization with actionable steps for senior management
• Learn how to identify current and future challenges to better enable management to focus on threat reduction and operational reliability
• Get up to speed on international and domestic approaches and frameworks for effective cybersecurity practices corporate wide

DAY 1: UNDERSTANDING THE CYBER WORLD

Understanding Cybersecurity
• The trillion dollar global cyber risk environment
• The enterprise-wide challenge of protecting the organization’s assets
• The impact of cybersecurity attacks on shareholder value
• Identity theft and the legal implications of data breaches

Social Engineering: The “Weakest Human Link” in Cybersecurity
• The responsibility for cybersecurity in the organization
• Assessing the quality of the cybersecurity workforce
• Evaluating shortcomings in meeting cybersecurity workforce standards
• Assessing the effectiveness of current professionalization tools

Understanding the Cybersecurity Testing Method
• Reconnaissance: How to use tools to find vulnerable systems and devices
• Packet sniffing: How to gather information from computer systems
• Port scanning: How port information is exposed on computer systems
• Password policy and cracking: What to consider when developing password policy
• Vulnerability: How to reduce attacks by enforcing proactive compliance policies

Basics of Security Architecture for Board Members and CXOs
• How architecture defines the structure of a system and makes it explicit
• The fundamentals of layered architecture: presentation, business, data, and service layers
• How the current computer network infrastructure was not designed originally to be secure
• Embedding architecting security into systems from inception

DAY 2: RESPONDING TO THE CYBERSECURITY CHALLENGE

Introduction to NIST’s Cybersecurity Framework
• Describing the enterprise’s current and target cybersecurity posture
• Identifying and prioritizing opportunities for improvement
• Assessing and accelerating progress toward the target state
• Communicating with internal and external stakeholders about cybersecurity risk

The Five Core Functions of NIST’s Cybersecurity Framework
• Identify: Organizational understanding to manage cybersecurity risk
• Protect: Safeguards to ensure delivery of critical infrastructure services
• Detect: How to identify the occurrence of a cybersecurity event
• Respond: Taking action regarding a detected cybersecurity event
• Recover: Maintaining plans for resilience and to restore any impaired capabilities

Introduction to Intelligence-driven Cyber Network Defenses
• How investigations are based upon the scientific method: observing, hypothesis, evaluation, prediction and validation
• How to leverage cutting edge technology, vigilant people and innovative processes
• How to continuously improve the enterprise process for defending IT assets
• How to empower people to resolve the problem with guidance and mentoring

Establishing or Improving a Cybersecurity Program
• Prioritize and scope: Identifying business/mission objectives and high-level priorities
• Orient: Identifying related systems and assets, regulatory requirements, and risk approach
• Create a current profile: Developing a profile by indicating current degree of preparedness
• Conduct a risk assessment: Analyzing the operational environment in order to discern the likelihood of an attack
• Create a target profile: Describing the organization’s desired cybersecurity outcomes
• Determine, analyze, and prioritize gaps: Determining gaps between current and target profiles
• Implement action plan: Deciding which actions to take in regards to identified gaps

Cybersecurity Boardroom Workshop 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to [email protected].

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
[email protected]
http://www.goldennetworking.com



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world. Anyone can join. Anyone can contribute. Anyone can become informed about their world. "United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.


LION'S MANE PRODUCT


Try Our Lion’s Mane WHOLE MIND Nootropic Blend 60 Capsules


Mushrooms are having a moment. One fabulous fungus in particular, lion’s mane, may help improve memory, depression and anxiety symptoms. They are also an excellent source of nutrients that show promise as a therapy for dementia, and other neurodegenerative diseases. If you’re living with anxiety or depression, you may be curious about all the therapy options out there — including the natural ones.Our Lion’s Mane WHOLE MIND Nootropic Blend has been formulated to utilize the potency of Lion’s mane but also include the benefits of four other Highly Beneficial Mushrooms. Synergistically, they work together to Build your health through improving cognitive function and immunity regardless of your age. Our Nootropic not only improves your Cognitive Function and Activates your Immune System, but it benefits growth of Essential Gut Flora, further enhancing your Vitality.



Our Formula includes: Lion’s Mane Mushrooms which Increase Brain Power through nerve growth, lessen anxiety, reduce depression, and improve concentration. Its an excellent adaptogen, promotes sleep and improves immunity. Shiitake Mushrooms which Fight cancer cells and infectious disease, boost the immune system, promotes brain function, and serves as a source of B vitamins. Maitake Mushrooms which regulate blood sugar levels of diabetics, reduce hypertension and boosts the immune system. Reishi Mushrooms which Fight inflammation, liver disease, fatigue, tumor growth and cancer. They Improve skin disorders and soothes digestive problems, stomach ulcers and leaky gut syndrome. Chaga Mushrooms which have anti-aging effects, boost immune function, improve stamina and athletic performance, even act as a natural aphrodisiac, fighting diabetes and improving liver function. Try Our Lion’s Mane WHOLE MIND Nootropic Blend 60 Capsules Today. Be 100% Satisfied or Receive a Full Money Back Guarantee. Order Yours Today by Following This Link.


Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.