Adversaries are using sophisticated, holistic intelligence strategies to gain information and attack your organization often resulting in devastating results. These strategies include insiders, cyber-attacks, physical breaches and social engineering tactics. To beat them at their own game, your organization must use a holistic threat intelligence strategy, as well. In this session, we will discuss how our Enterprise Threat Intelligence Assessment (ETIA) can provide a baseline to critical knowledge to help identify your adversaries, their focus, motivation and capabilities. We will discuss actual case files and demonstrate how this critical knowledge can help faster, more effective business decisions, further reducing risk by predicting and preventing attacks and ultimately eliminating surprise.
Information as we know it today, is more readily available than ever before. It can be obtained through multiple sources (OSINT) and consumed through various channels via the web. We are often flooded, overwhelmed even, by data. Understanding and dissecting this data is key for effective decision making when it comes to security operations and business continuity.
Climate trends are deviating substantially from prior norms, and these deviations are impacting the reliability of existing energy systems and the siting of new systems. Current methodologies for evaluating risks to fielded infrastructure and for identifying stable locations for the future are no longer valid.
You've got a business continuity plan. It's reviewed, tested, maintained, and updated. Maybe you've even got some metrics that you report. That's great. But, have you asked yourself two critical questions: In a crisis, am I recoverable? And, how do I deliver value absent a crisis?
This presentation looks at the critical link between Business Continuity and Crisis Management and challenges the notion that traditional plans are equivalent to readiness. Rather, I propose that security managers are in a unique position to drive value to their organization throughout a CM/BC planning process (not just at the end, or when something bad happens), and offer strategies for doing so.
No matter what part of the world you are located, we all must deal with natural disasters of some sort. Whether that be flooding, seismic activities, hurricanes or typhoons, or thunderstorms, these natural disasters throw our regions and communities into chaos. First Responder services are stretched thin, utilities are damaged, and our personnel have their personal situations to deal with on top of work challenges. These factors all contribute to our organizations becoming more vulnerable to cyber intrusions and the compromise of our physical security measures.
In the wake of the Mumbai attack in November 2008, there was a concerted effort to prepare for and respond to Complex Coordinated Terrorist Attacks (CCTA). However, in the intervening years, focus on these low probability - high impact events has diminished. This presentation seeks to re-focus some attention on CCTA for security professionals and upper-level management. It provides a definition but more critically it discusses how and why terrorist groups utilize them and what are effective risk and crisis management strategies. In 2020, terrorists targeted government buildings, houses of worship, and financial institutions. Moreover, terrorism's transnational nature means that knowledge is being transferred among groups accelerating their capability.