AN EXPERT PANEL
STREAMED AND RECORDED LIVE FROM BLACK HAT USA 2017
CISSP, Founder and Editor-in-Chief, ITSPmagazine
Small and medium businesses face countless threats, most of which have a human at their origin. These criminals, driven by financial gain, are essentially business owners – not unlike yourself – who are looking to spend as little money and as few resources as necessary to generate as much revenue as possible. Therefore, most cybercriminals target businesses that have one more more of the following attributes:
- Employees have access to computers, laptops, company email, POS terminals/tablets, customer service portals and other business resources that collect and/or store business and customer information
- The budget does not include cybersecurity protection measures
- The budget has little to nothing allocated for employee awareness training
- They think they are too small, have no useful information, are off the cybercrime radar, and are therefore not a target
Since most attacks aren’t really targeted in nature, that last point may not be too far off the mark. BUT this doesn’t mean that these business are off the hook. On the contrary, it means that it’s as simple as taking candy from a baby to breach an SMB. Why would cybercriminals spend a lot of money going after a Fortune 1,000 when they can spend just a few bucks to crack a small business?
During this live webinar, we’ll explore the types of threats that small and medium businesses face and the business risk associated with these threats. It’s easier to get hacked than you think and it’s just a matter of time before it happens. Will your business be prepared? Are you doing everything you can to protect yourself beforehand?
Knowing that perfection is not possible, our panel of experts will look at 4 key steps that small and medium businesses can take to reach a reasonable level of cybersecurity:
- How to conduct an analysis in order to determine risk and the need to focus on cybersecurity within your business
- How to assess the cost of a breach, a loss of information and the impact that a cybersecurity event can have on your customers and partners
- How to create a plan to protect your systems, information, revenue and customers’ data
- Best practices for guiding your implementation: from segmentation to employee access control policies to information protection controls