Recent years have seen a massive increase in cyber theft of private and confidential information from government agencies, business and private individuals. The modern spy is responsible for these attacks. Today’s spies are sophisticated, brilliant, devious and technologically advanced, and they are targeting your data. Robert Hanssen was the first of these new cyber spies, charged with selling American secrets to Russia for more than US$1.4 million in cash and diamonds. His ability to exploit computer systems allowed him to protect his identity during a 22 year spy career. Join Eric as he uses real-life spy stories to show how careful diligence, counter espionage techniques and restraint in social media can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.
KEY ISSUES THIS SESSION WILL ADDRESS
Every company holds data that is confidential and proprietary. In many cases, this data is subject to regulatory control and compliance requirements. The theft, loss, breach or corruption of this data can create serious financial and reputational consequences for companies. It is impertative that companies secure their data and remain vigilent in the protection of this data.
Today’s Information Governance professional must understand his/her role in helping the organization combat these threats. By knowing where the data is, how it is being used, and how it is being protected, Information Governance professionals can help the organization avoid the damages that can occur from a breach or theft of the data.
In order to do this, Information Governance professionals must understand the issues related to CyberSecurity in today’s world.
KEY TAKEAWAYS FROM THIS SESSION
Attendees will understand that in order to protect against cyber attack, breach and other forms of information theft/damage/breach, organizations need to know where the information is, who is using it, how is it being used, and where the access point to the data are. In addition, organizations need to manage information so that they are not keeping around quantities of sensitive data that you no longer need.
Attendees will be exposed to the point of view that today’s Information Governance professional does not need to know how to write security software, but does need to be versatile enough to sit with those in the organization that are responsible for security and to be able to speak their language, and to provide a value-add by bringing knowledge of the companies information and data landscape.
Attendees will learn to compare the practice of information and data security to that of the legal framework that governs all of us…it paces behind technology and those responsible for implementing it (e.g., security) and is often outpaced by the hackers in terms of technological capabilities.
Attendees will see that in order for professionals to adequately address security, they must first begin thinking like the criminal.
Information Governance professionals can play a critical role in helping their organizations identify CyberSecurity risks and protect their most valuable information assets.
Speaker: Eric O’Neill