Enterprise Data Security
The focus of this talk will be to revisit both traditional governance best practices that are still invaluable to proper data management and governance efforts, as well as practical technological controls that can support the management of data.
Open web directories have long been a target of hackers looking for cheap wins in the search for sensitive data. Today, open S3 buckets are becoming a new favorite source for discovering data sitting on the public internet.
Following recent news reports of substantial data breaches, devastating leaks, and even savvy executives falling prey to phishing attacks, there is renewed interest in making sure that people are protected when they use their devices.
Increasingly sophisticated artificial intelligence (AI) capabilities make headlines daily. AI also comes with a range of security vulnerabilities, some of which can exacerbate a company’s exposure not only to cybersecurity issues, but also geopolitical risk.
Revelations of a massive breach of Google+, a largely defunct challenger to Facebook, suggests that the data of hundreds of thousands of users was compromised over a period from 2015 to March 2018.
With network perimeters becoming more hardened, phishing is an ever-popular way for attackers to gain a foothold into a company network. VerSprite’s own experience with phishing engagements show us just how effective and easy it is to run successful phishing campaigns.
We are an international squad of professionals working as one.
Copyright 2018 VerSprite - All Rights Reserved