Date: Monday, March 27
Time: 10:45 am - 11:15 am
All Access, Quick Pass Monday
Cybersecurity, Policy and Governance
Vault Recording: TBD
In today's hyper geo-competitive world, businesses and governments must implement a top down cybersecurity and privacy strategy from the board, C-Suite, management, supply chain, to the frontline employee to eliminate or mitigate threats posed by competitors and adversarial nation-states, including nation-state hackers. Many organizations and government entities only employ a tactical level cybersecurity strategy that is centered on threats posed mainly to network/critical infrastructure with little or no focus on endpoint cybersecurity associated with mobile devices that include smartphones, tablet PCs and connected products in general.
This session will cover threats associated with insider attacks, intrusive operating systems, apps, and supply chain. The session will also cover best practices to help eliminate or mitigate all threats concerned.