Page 2 - Cyber Defense eMagazine - September 2017
P. 2

CONTENTS







               FROM THE EDITOR’S DESK                                                                       4


               BLACKHAT 2017 – MOST INNOVATIVE INFOSEC VENDOR DISCOVERED!                                   6


               PRODUCTIVE CYBER SECURITY TRAINING: WHO CARES ABOUT AWARENESS?                             12


               RETHINKING COMMON WISDOM                                                                   12


               WHY IMPROVING AWARENESS IS A TERRIBLE GOAL                                                 13


               PHISHING DEFENSE                                                                           14


               PHISHING YOURSELF: THE FINER POINTS                                                        15



               CONSISTENCY IS EVERYTHING                                                                  16


               THE NOISE BEFORE DEFEAT: A FOCUS ON CYBERSECURITY TACTICS                                  18


               SOUTHERN OREGON UNIVERSITY BREACH: AN EXPENSIVE LESSON                                     22


               CONNECTED VEHICLE APPS - HIGH RISKS                                                        25


               THE TOP FOUR CISO DATA SECURITY CONCERNS AND DEPLOYMENT TRENDS…                            28


               DEALING WITH INSIDER THREATS: HOW TO REPAIR THE WEAKEST LINK …                             32


               SOCIAL “INSECURITY:” EQUIFAX SECURITY BREACH LEAVES 143 MILLION…                           36


               DO YOU KNOW WHO YOU’RE LETTING INSIDE YOUR NETWORKS?                                       42


               A NEW APPROACH IS ESSENTIAL IN THE BATTLE AGAINST CYBERTHREATS                             46


               THE LINK BETWEEN CORRUPTION AND CYBER DEFENSE                                              49




                     2   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7