Recent Data Breaches – Lessons Learned

https://www.google.com/url?sa=i&url=https%3A%2F%2Fbnd.nd.gov%2F81-of-company-data-breaches-due-to-poor-passwords%2F&psig=AOvVaw2WcahAmoohIKPqdBxVe2eH&ust=1625683462885000&source=images&cd=vfe&ved=0CAoQjRxqFwoTCMiBxv2Mz_ECFQAAAAAdAAAAABAI

Presented: December 11, 2015 12:00 pm (ET)
Presented by: Glen Roberts

Data breaches are a routine occurrence and organizations often view a breach as not a matter of if, but rather matter of when. Breaches can be financially lucrative for adversaries. All organizations, regardless of their size, industry and/or geographical location are potential targets. To that point, adversaries are determined and have a seemingly endless supply of critical resources needed to carry out a data breach, including existing and new attack methods.  This presentation references recent data breaches for the purposes of identifying various adversarial attack methods and the never-ending challenges faced by organizations. The presentation progresses to the role/risk humans play in the security chain and concludes with some basic risk mitigation strategies for organizations to consider.

Focus Areas

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Want to find out more about this topic?

Request a FREE Technical Inquiry!