With each passing day, the frequency and complexity of security threats and breaches are expanding. Over 50% of breaches are caused by human error or systems misconfiguration. As breaches continue to rise, so does the cost per breach, currently $7.9 Million for U.S. companies. Security challenges exist in many industries and verticals, including the legal world. A few significant data protection challenges are:
- Traditional data boundaries no longer exist.
- The concept of connectivity from any device, anytime, anywhere has expanded access control and business application connectivity challenges.
The ability for any user to create or hold large amounts of data, including sensitive information, increases the risk of data compromise. The concept of open access for today's "connected" devices (IoT), has opened up questions such as, "What am I actually connecting to?"; "Is this connection authorized and safe?" and "How am I sure the data exchange is meeting my organization's policies?
As a result, information security risk management has become a very difficult task to manage. Security risk management requires a detailed understanding of threat and risk, a complete model to determine "real and measurable" risk and a comprehensive program of risk governance.
Join us as we discuss the current state of common threats, the types of attacks and techniques that are being executed and review an information security risk management program strategy that can help your organization meet this threat head-on and develop a plan for moving existing risk into an acceptable range.
Stephen Nardone - Practice Director, Security and Mobility, Connection