Cyber threat prevention

Published on August 30, 2018   56 min
Hello my name is Stephen Thurlbeck and I am pleased to be taking you through Cybersecurity threat prevention. As a company that focuses on C- level thought leadership, business transformation, and bespoke software development and integration, Cybersecurity is front of mind and close to my heart. In the next 30 minutes or so, we will be exploring where vulnerable information lives, the evolution of threats and finally the anatomy of a data breach and preventative steps that you should be taking.
Despite training, years of preparation, and a lot of long days troubleshooting and mitigating issues, I continue to come across situations I've not previously seen. As well as issues that should have been resolved years ago. We're going to walk through a few statistics and definitions to start and then, I'm going to help you understand where your data lives and when it's vulnerable. I will provide some insight into the past to help us understand where we are now, and we're going to walk through the evolution of a data breach; and then talk through prevention and diffusion. At the end of this seminar, you will understand data states, levels of vulnerability in the kill chain. I'm going to respond to some frequently asked questions, and provide details around controls, and talk about prevention. Finally you should walk away from this seminar with a few pointed questions for your teams and some specific Cybersecurity risk mitigation steps to follow. I hope you enjoy your time with me.