+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Assessment of Network Security - Webinar (Recorded)

  • Webinar

  • 65 Minutes
  • August 2024
  • Lorman Business Center, Inc.
  • ID: 5978908

Gain an understanding of how your business can protect its data assets on-premises and in the cloud.

Because the work-from-home movement and migration to cloud architecture has dramatically altered and increased the threat surface of business data networks, corporate boards and their CISOs need to reevaluate their data network security policies, procedures and approach to meet evolving security threats. Relying on an on-prem approach could unwittingly place valuable data assets at risk. This topic is intended to review the people, processes, and technology that can mitigate that risk.

Learning Objectives

  • You will be able to define how a business can protect its data assets on premises and in the cloud.
  • You will be able to describe Identification and Authorization (IAM) policies and procedures.
  • You will be able to discuss use of Cloud Storage, e.g. OneDrive®, Google Drive™, iCloud®, etc.
  • You will be able to explain data loss prevention (DLP) solutions.

Agenda

Overview

  • Approach
  • Speaker Background

Situation, Complications, Question

  • Situation - Increase in Attack Surface
  • Complications - Introduction of Hybrid Computing Environments
  • Question - How Can a Business Protect IT Data Assets on Premises and in the Cloud?

People

  • The Board of Directors
  • Chief Information Security Officer (CISO)
  • Managing Consumers

Process and Policies

  • Training and Awareness
  • Bring Your Own Device (BYOD) Policies
  • Identification and Authorization (IAM) Policies and Procedures
  • Access to External Storage
  • Data Loss Prevention (DLP) Solutions
  • Encryption of Data in Transit and at Rest
  • Multi-Form Authentication

Technology

  • Zone Segmentation
  • Network Vulnerability Management
  • Firewalls
  • Intrusion Detection Systems
  • External Consumers
  • User Activity Monitoring

Conclusions

  • Questions
  • Thank You

Speakers

  • Patrick T. Cronin, Esq.
  • Patrick T. Cronin, Esq.,
    Eastern Computer Forensics


    • Senior manager for Accenture, an international system integrator; Accenture is a consultancy which enables their clients’ team so their clients can implement the processes and technology to deliver data excellence and drive their business forward; Patrick’s focus is privacy and data governance
    • Principal for 10 years in the forensic firm of Eastern Computer Forensics; Eastern Computer Forensics provides litigation support to law firms in the areas of data analysis, historic cell tower analysis, and forensic cell phone/hard drive analysis
    • Conducts regular seminars on data analysis and data visualization for attorneys
    • Has been admitted in both criminal and civil proceedings as an expert on data analysis topics
    • J.D. degree, Rutgers University; B.S. degree in computer science, William Paterson University; cert. forensic analysis, Champlain College; cert. data analysis, Johns Hopkins University
    • Can be contacted at patrick_t_cronin@msn.com

Who Should Attend

This live webinar is designed for accountants, controllers, CFOs, IT managers, network administrators, CEOs, business owners and managers, bankers, and attorneys.