Posted on
in Presentations
Most data breaches result from user failings. The response is to implement awareness, but alone it is unsuccessful. In this lab, attendees will work through common attacks targeting people; identify an appropriate combination of technology, process and awareness; and prepare their organizations to effectively mitigate human vulnerabilities with a combination of technology, process and awareness.
Learning Objectives:
1: Identify root enablers of attacks targeting people.
2: Identify technologies and processes that can mitigate attacks.
3: Determine the best balance of countermeasures to optimally mitigate attacks.
Learning Objectives:
1: Identify root enablers of attacks targeting people.
2: Identify technologies and processes that can mitigate attacks.
3: Determine the best balance of countermeasures to optimally mitigate attacks.
Share With Your Community