Social Network For Security Executives: Help Make Right Cyber Security Decisions
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on:
The Internet is fundamentally open:
What Can We Do?
Network MUST be:
Another Approach - Awareness
Good awareness program for enlightening your staff to the dangers of Spear Phishing
You can predict the future based on the past. The enemy can't change all his techniques, and once you've learned about your adversary, you can deal better with the oncoming waves of attacks.
As attacks have migrated from targeting systems via exploits to targeting people, security breaches are growing in number and sophistication. Therefore, it is no longer acceptable to rely exclusively on preventative measures . . .
New Technology Gadgets are also under Threat
Many users of the Mac OS X platform still view it as absolutely safe, primarily because Apple has assured them for many years that the system is more secure than PCs. However, recent analysis has challenged that assertion. There are significant numbers of Mac users. Botnet (as Trojan-Downloader.OSX.Flashfake) to have attracted the attention of experts in Q1 was the zombie network built of Mac OS X computers. In March 2012, Flashback infected about 7,00,000 computers across the globe.
CISO Team needs to wear different shoes, meaning wear the shoes of his/her customer and participate in building requirements then (s)he may be able to deliver better shoe
-By Sharat Airani