Building a Cyber Security Strategy That Works

Nonmember Price: $0.00
Member Price: $0.00
In stock
Code (SKU)
WB-231017-CSAM

Tuesday, October 17, 2023 12:30pm EDT
Sponsored By: Genetec
1 CPE
ASIS International is requesting your personal information to meaningfully communicate in response to your registration for this event. We will use this information for registration, service delivery, logistics, and communication needs related to this event. You may always rescind your consent, per our Privacy Policy.
ASIS may provide my name and contact information in the roster of registrants to event sponsor Genetec, and will be handled in accordance with the presenting sponsor’s published privacy policy.

The webinar describes the necessary elements for a company to create a meaningful roadmap to achieve its cyber security strategy.

Free to all | Registration required

Thank you to the Information Technology Security Community for their collaboration and support of Cybersecurity Awareness Month, October 2023.


Tuesday, October 17, 2023 12:30pm EDT
Sponsored By: Genetec
1 CPE

Thank you to the Information Technology Security Community for their collaboration and support of Cybersecurity Awareness Month, October 2023.

Description

This discussion focuses on establishing an organization's cyber security maturity and then taking that knowledge and crafting a practical cyber security strategy that improves the enterprise's security posture. The talk illustrates the breakdown of cyber security needs into measurable efforts that, when completed, raise the enterprise's security posture. Finally, the presentation shows the necessary elements for a company to create a meaningful roadmap to achieve its cyber security strategy and execute it.

The session describes the necessary elements for a company to create a meaningful roadmap to achieve its cyber security strategy. The efforts illustrated include: Vulnerability Scans; Asset Inventory; Network Topology Maps; Vulnerability Management; Patching and Updating; Support contracts for critical infrastructure; Geo-diverse Backup Strategies; Email Security; User Security Training; Endpoint Security; DNS Protection; Firewall Security; Change Management; Multi-Factor Authentication; Identity and Role Management; Cyber Insurance; Network Segregation; IT Security Policies; Secure Remote Access; Certificate Management; Proactive Threat Hunting (IOC and Genetic); Network Traffic Baselining; Application inventory and management.

Learning Objectives

Upon completion, participants will be able to:

  • Learn what is my enterprise’s cyber security posture.     
  • Learn how to craft a meaningful cybersecurity strategy.  
  • Learn practical ways to break down efforts to execute my cyber security strategy.

Speaker*

Robert Miller
Global Data Systems
Chief Operating Officer

Bob is currently the Chief Operating Officer of a Managed Security Service Provider that delivers both managed security services and specialized telecommunications and IT solutions for a diverse customer base in Health Care, Energy, Logistics, Government, and the Retail enterprise space. Bob has built and served as the direct manager of the GDS Software Development Team as it transforms GDS business processes through high levels of automation, thereby realizing steady returns on those investments. Bob also manages the Business Development of our Security Services and developed the Security Maturity Level Framework.  Bob’s leadership has helped GDS to be named by Channele2e as the #2 MSP in the world in the Health Care vertical, the #6 company overall for the top 100 Vertical MSPs, and #86 in the top 250 MSSP list for MSSP Alert and ChannelE2E.

*Note:  Speakers and content are subject to change without notice.

Credit Information

Completion of this webinar is eligible for 1 CPE credit.  CPE credits for ASIS-sponsored webinars will be updated in your user profile within 48 hours of completion.  Self-reporting of CPE credits is not required.  


Tuesday, October 17, 2023 12:30pm EDT
Sponsored By: Genetec
1 CPE
Write Your Own Review
You're reviewing:Building a Cyber Security Strategy That Works