Be the first to like this
The White House recently released an Executive Order, Improving Critical Infrastructure Cybersecurity, to Federal Departments and Agencies. The Executive Order specifically directs the National Institute of Standards and Technology (NIST) to “lead the development of a framework to reduce cyber risks to critical infrastructure.” If cybersecurity, even at the national level, requires more focus, what can be said for the state of security within the rest of our Nation’s businesses?
We commonly think of our data being most vulnerable to outside hackers, but blocking the traffic outside with hardware and software is not sufficient protection. In fact, a staggering number of companies fail to take adequate preventative measures to protect data and intangible information. Companies that operate within compliance regulations should be especially concerned with how easily their own people can be made to share protected information without their knowledge - a practice commonly referred to as “social engineering.”
In this interactive discussion, Michelle Syc, Certified Ethical Hacker, will share the essential components of a Cybersecurity Framework to reduce the risk to critical infrastructure. Attendees will learn how to begin to align policy, methodologies and
technology to identify their risk exposure and protect their most important information.
Presented By: Michelle Syc, Cybersecurity Defense Advisor with CohnReznick LLP
Michelle D. Syc, CISSP, CEH, has over 10 years of experience in risk management. Her focus in the cyber security and compliance industry allows her to assist clients with identifying and assessing information system related risks and implementing strategies to manage those risks.
Michelle has extensive experience managing security audits, which include ethical hacking, penetration studies, and social engineering projects. She assists organizations in properly aligning information security spending to cost-effectively reduce the risk of data loss. Michelle designs test plans to evaluate control objectives and to identify weaknesses in the information technology control structure. She assists organizations in complying with information security regulations such as HIPAA, PCI DSS, MA201CMR and other Federal and state regulations.
She is a member of the Connecticut InfraGard chapter, which partners with the FBI to share information and intelligence to prevent hostile acts against the United States.
Clipping is a handy way to collect important slides you want to go back to later.