Data Breach Prevention and Response Summit , Events , Incident & Breach Response
Building And Operating A Baseline Defense - The Critical People, Process and Technologies, and as Compliance does not Equal Security, we Must Have the G, the R and the C
Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defensive security program be put in place and managed effectively. This will not prevent the persistent well-organized targeted attacks, but will eliminate 99 percent of the background noise and the vast majority of more opportunistic attacks.
There are many examples of data breaches trivial to perpetrate as basic Security 101 practices were not being followed in "compliant" networks, due to ineffective GRC. Unfortunately though the term GRC often conjures up thoughts of burdensome capital expenditure followed by never ending customization and deployment cycles. It does not have to be that way and it is absolutely critical to document and communicate the policies by which you are Governed, apply them in a Risk based manner and continuously demonstrate Compliance with them.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.