Winter Garden - 5th Floor
May 08, 2018 02:45 PM - 03:15 PM(America/New_York)
20180508T1445 20180508T1515 America/New_York Now, Let's Try Not to Over Respond

There is a growing understanding within the complex nature of the incident response ecosystem. This complexity spans across management, boards, individuals and groups. A valid cyber security strategy is one that enables the visibility of external threats and vulnerabilities throughout a digital infrastructure. While enabling an understanding of the potential impact from an attack, and the effective ways of identifying and remediating.

With this in mind, cyber security's teaching and learning strategies needs to combine knowledge of the technical infrastructure formed by applications, systems, and networks; and what their relationship with people and businesses process. We will cover the different dimensions of this subject in a learning strategy. This procedure will be based on a range of incident response protocols; such as a variety of methods designed to suit the needs of an occurrence of an event, and will equally adhere to the cyber security goals of the organization.

Winter Garden - 5th Floor HACK NYC 2018 events@magegroupe.com
17 attendees saved this session

There is a growing understanding within the complex nature of the incident response ecosystem. This complexity spans across management, boards, individuals and groups. A valid cyber security strategy is one that enables the visibility of external threats and vulnerabilities throughout a digital infrastructure. While enabling an understanding of the potential impact from an attack, and the effective ways of identifying and remediating.

With this in mind, cyber security's teaching and learning strategies needs to combine knowledge of the technical infrastructure formed by applications, systems, and networks; and what their relationship with people and businesses process. We will cover the different dimensions of this subject in a learning strategy. This procedure will be based on a range of incident response protocols; such as a variety of methods designed to suit the needs of an occurrence of an event, and will equally adhere to the cyber security goals of the organization.

CEO
,
LIFARS
No moderator for this session!
Attendees public profile is disabled.
Upcoming Sessions
248 visits

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.