Cyber Security - Essentials to Protecting Your Network: A Top to Bottom Review of Protecting Enterprise Critical Infrastructure
When: Friday, May 24th, 12 PM - 1 PM
Where: Stoke, 608 E. Hickory St. Suite 128, Denton, TX 7620
Protecting your data and your clients’ data helps you maintain your reputation and avoid losing time, money, and trust. For individuals and for business owners, understanding cyber security can help you prevent data breaches and theft of data that can include personal information, trade secrets, and more.
Cyber security refers to the body of technologies, processes, and practices designed to protect networks (devices, programs, and data) from damage or unauthorized access, sometimes referred to as information technology security.
In this brief overview of cyber security and preview of the Lunch + Learn, you’ll read about:
Why data is an asset and liability
Top industries affected by data breaches and how
Takeaways from “Cybersecurity - Essentials to Protecting Your Network”
Data As An Asset and Liability
Personal data helps businesses understand their customers better, but it can also be a liability if it’s stolen. Cyber crime threatens security for individuals, companies, banks, and other organizations. Compromised data can include contact information, social security numbers, income information, and more. Most companies have preventative software to prevent or stop cyber attacks and many industries require it.
Cyber hackers monetize stolen data by using it themselves for fraudulent activity or selling it to a third party. A single lapse or vulnerability in your network could result in sensitive data being tapped into. Once stolen, data can be used for phone call scams, spam through text or email, unsolicited marketing, access to online accounts, illegal money transfers, and more.
After a cyber attack, taking care of the consequences can cost an organization a significant amount of time and money. In 2018, in the United States, data breach costs averaged $7.91 million. Organizations must also undergo remediation, investigation, and analysis to mitigate cyber attacks (linked). Additionally, difficult to quantify consequences include negative effects on your reputation, loss of trade secrets or intellectual property, diminished market value, and damage control through marketing and public relations.
Top industries affected by data breaches in 2018
Industries in danger of data breaches include but aren’t limited to healthcare, technology, retail, finance, and government. In many cases, individuals and organizations are not aware of data being compromised or stolen until much later, or only because of cases of identity theft or an audit.
In the healthcare industry, a common cause of data leaks is caused by human error and network vulnerability.
Sensitive and classified government information can fall into the wrong hands without proper cyber security initiatives; examples of data stolen include security clearances and fingerprints.
Financial organizations focus on implementing best practices, required by industry standards, and for good reason - banks are 300 times more likely to be targeted than any other industry.
Lower security standards for retailers has also resulted in theft of customer data, such as credit card information.
Stoke Lunch + Learn Speaker: David Evenden
David Evenden is an experienced offensive security operator and analyst with 12 years of active work experience inside the intelligence community. During his career, he learned Persian Farsi, worked at NSA Red Team, and was a member of an elite international team in the Middle East. He is a vulnerability exploitation analyst, offensive intelligence analyst, and owner & founder of StandardUser Cyber Security.
What You’ll Learn At “Cyber Security - Essentials to Protecting Your Network”
To learn about how to maintain your own cyber security health and ask questions of an expert, come to the Lunch + Learn on Friday, May 24th at Stoke. Attendees will learn how to establish a positive Enterprise Cyber Security Environment based on following the four main pillars of Enterprise Cyber Security (visibility, teamwork, leadership, and experience). The main takeaways of this Lunch + Learn include
Identifying common chokepoints to monitor to ensure cyber enterprise visibility
Understanding the core elements needed to build a healthy Cyber Team
Learning distributed leadership techniques and how to enable your team to succeed
Succeeding in cyber security by equipping experienced team members
Lunch is provided from a local Denton restaurant. This event is free for Stoke members with a small charge for nonmembers ($4 + Eventbrite processing). RSVP is required for your spot!