Data breaches are a routine occurrence and organizations often view a breach as not a matter of if, but rather matter of when. Breaches can be financially lucrative for adversaries. All organizations, regardless of their size, industry and/or geographical location are potential targets. To that point, adversaries are determined and have a seemingly endless supply of critical resources needed to carry out a data breach, including existing and new attack methods. This presentation references recent data breaches for the purposes of identifying various adversarial attack methods and the never-ending challenges faced by organizations. The presentation progresses to the role/risk humans play in the security chain and concludes with some basic risk mitigation strategies for organizations to consider.
Host a Webinar with CSIAC
Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
Want to find out more about this topic?
Request a FREE Technical Inquiry!