Cyber Attacks: The Best Defense is a Good Offense

WatchIT
Show More

Related videos

Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Insider Threats and Attacks: Detection and Prevention
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled…
Rootkits: A Growing Security Threat
Rootkits are malicious programs, that when downloaded, can allow an intruder control over a system without ever being detected. Once installed, Rootkits can enable access to personal information, track a user's Internet activity or even hijack a computer for botnet attacks or spam distribution. In this program viewers will learn…
Enterprise Security Landscape
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director…
Cyber Terror and Cyber Risk: What You Need To Know
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and…
Red Teams: Securing the Enterprise
To protect business critical networks and applications from a malicious cyber-attack, organizations today often employ Red Teams to challenge and test enterprise system defenses. The Red Team's goal is to covertly seek out vulnerabilities and identify them before the "bad guys" can do any damage. In this report, expert and…
Incident Response Plans - Advice and Best Practices
CIOs, IT and business leaders must be proactive in their planning and always ready to respond when it comes to cyber threats and attacks. Security experts agree that attacks are no longer a matter of "if" but are now clearly a matter of "when" for organizations today. A critical element…
Enterprise Security Landscape: Risks and Controls
Part of the Series: WatchIT Auditing Collection
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise…
Supply Chain: Understanding the Risk Factors
Where would our global economy be without supply chains? Going nowhere fast, would be a quick but accurate response. Let's face it, no matter if your firm is a manufacturer, retailer or financial organization you are undoubtedly tethered to, and reliant on, a supply chain. In this program expert, Joe…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the…
Cyber Ethics: A Growing Business Challenge
Organizations today are trying to stem the tide of increasing cyber attacks, as well as inappropriate online behavior, by raising the level of cyber ethics. In this report, Peter Vogel, Partner with Gardere Wynne Sewell LLP, examines this new area of concern and the issues it raises, especially for IT…
Social Networking - Does it Work at Work?
Not all that long ago, CIOs and IT managers were listening to the grumblings of many of their business colleagues who wanted to shut down or ban employee access to popular social networking sites such as Facebook, Linkedin and Twitter. However, the tide of opinion may be moderating, as some…