Just recently, our staff was made aware of a program offering free cyber security related training and awareness courses. These courses are funded by DHS/FEMA in cooperation with the Texas A&M Engineering Extension Service (TEEX). The objective of this DHS/FEMA partnering is to ensure that cyber space is supported by secure and resilient infrastructure(s) ---delivering open communications, information and prosperity while protecting privacy and confidentiality. These courses are offered at no cost and students can earn a TEEX certification of completion and Continuing Education … [Read more...]
Free Cyber Security Awareness and Training Courses Offered by DHS/FEMA Partnership with Texas A&M University.
Many of our readers are aware of recent stories about data breaches, IP theft, and fraud in the news. In addition, they have become more aware of so many companies now realizing that background checks and interviews are not foolproof --- and even more importantly, they are realizing that there are times when the greatest threat to an organization is on the inside of that organization. Join Mike Tierney and security expert Alan Shimel on Thursday, September 12, 2013 at 2:00 PM EST, as they discuss the unique challenges associated with detecting and preventing insider threats. Because an … [Read more...]
Wireless network security levels were tested recently in Edinburgh Scotland by a cyclist who “war-biked” around the capital trying to find unsecured wireless networks which could be exploited by hackers. Security expert James Lyne utilized a bike equipped with dynamos and solar panels to power a computer which scans for wireless networks which have no or poor security. As our readers well know, hackers can join wireless networks and then become totally capable of directly attacking those computers and other devices to steal money or information. They can also track which websites you … [Read more...]
Protecting a company’s digital assets continues to be a challenging component of a director’s and/or board member’s total fiduciary duties --- and--- with the growing number of regulations now imposing more specific privacy and cyber security related obligations on companies --- answering the question of whether or not those directors are managing cyber risks responsibly begs the need to find out how well those directors are really doing….. To that point, Carnegie Mellon University’s “CyLab” group recently released the results of a survey it conducted which examined data across geographical … [Read more...]
The risks associated with employees now bringing their own smartphones, tablets and mobile storage devices to the job remain a topic on the minds of every information security professional in nearly all organizations. While much has been and will continue to be written on this topic, risk management strategies by many CISO’s are still too often trying to develop defenses that reject this trend rather than trying to find ways to embrace this trend as a means to cut costs and improve productivity. In an exclusive case study now being offered in a webinar format, Intel CISO Malcolm Harkins … [Read more...]
Unfortunately, for many U.S. companies facing the reality of data breach occurrences and data breach notifications – i.e. reaching an agreement on what they are and what are you required to do once they occur – remains a very complex topic yet still poses potentially large economic risk(s) when they occur. Even more to the point, each state and its jurisdiction requirements within the U.S. differs in one way or another on how to legally handle data breach occurrences and the notification requirements that accompany them.. Just as important, even a local or regional business, dealing with … [Read more...]