Data Security Breaches Part 4: Wising-Up to Real-Life Impacts
Published August 12, 2015
|
57 min
    Download
    Add to queue
    Copy URL
    Show notes
    The buzz: Spelling bee. Cybersecurity breaches in the headlines still strike fear in companies, governments and individuals worldwide. For businesses, the advent of the IoT can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications, a traditional no-no. With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between 30-year-old sensors without Internet protocol support? The experts speak. Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SECRET ICY RUBY – ICE CURRY BYTES – I RUT BY SECRECY.” Hillel Zafir, HMS Technology Group: “Let’s start at the very beginning, a very good place to start. When you read you begin with ABC.” (Sound of Music). Richard McCammon, Delego: “We will bankrupt ourselves in the vain search for absolute security” (Dwight D. Eisenhower). Join us for Data Security Breaches Part 4: Wising-Up to Real-Life Impacts.
      15
      15
        0:00:00 / 0:00:00