Page 4 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 4

The Most Common Types of Cyberattacks Plaguing SMBs An How to Protect Against Them
             ............................................................................................................................................ 60

            By Richard Clarke, Chief Insurance Officer, Colonial Surety

            Why A “Group of Rivals” Developed A Cybersecurity Taxonomy, And What It Buys You ........ 63

            By Charlie Miller, Senior Advisor, Shared Assessments, CTPRP, Distinguished Ponemon Fellow

            What is Business Email Compromise? .................................................................................. 69

            By Shanna Utgard, Senior Cyber Advocate, Defendify

            Firewalls Aren’t Enough to Protect Against Evolving Cyber Threats ...................................... 72

            By Pat McGarry, CTO, ThreatBlockr

            The Top Five Reasons You Should Take Operational Technology Cybersecurity Seriously ... 75

            By Matthew Morris, Global Managing Director, 1898 & Co.

            Not Slowing Down ................................................................................................................ 79

            By Kimberly Patlis Walsh, President and Managing Director of Corporate Risk Solutions (CRS)

            Advantage- Disadvantage Analysis for Implementing Cloud Services .................................. 84

            By Zsolt Baranya, Information Security Auditor, Black Cell Ltd.

            Reshape Security and Embrace Cyber Resilience with Hillstone Networks ........................... 89

            By Timothy Liu, CTO & Co-founder, Hillstone Networks

            Moving Beyond Budget Battles: The Real Secret to Improving National Cyber Defenses ...... 91

            By Teddra Burgess, SVP, Public Sector, Tanium

            Continuous Biometric Authentication Tool  Against Account Takeovers .............................. 96

            By Tamas Zelczer, CEO, Cursor Insight

            A Guide to Mitigating the Cyber Risks Posed by Refurbished Hardware ............................... 99

            By Eloïse Tobler MSc, Ecommerce Supervisor, Wisetek

            Acquiring Actionable Knowledge Through Collaboration .................................................... 103

            By Nicole Mills, Exhibition Director, Infosecurity Group






                                                                                                               4
   1   2   3   4   5   6   7   8   9