Data Security Breaches Part 4: Wise-Up to Real-Life Impacts

August 12, 2015 by Bonnie D. Graham

The buzz: Spelling bee.

Cybersecurity breaches in the headlines continue to strike fear in the hearts of companies, governments and individuals worldwide.

For businesses, the advent of the IoT [Internet of Things] can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications – which has been a long-standing no-no.

With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between your 30-year-old sensors that lack modern Internet protocol support?

The experts speak.

Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SECRET ICY RUBY – ICE CURRY BYTES – I RUT BY SECRECY.” (Anagram generator)

Hillel Zafir, HMS Technology Group: “Let’s start at the very beginning, a very good place to start. When you read you begin with A B C…” (“Do Re Mi” from The Sound of Music, sung by Maria and the Von Trapp Children)

Richard McCammon, Delego: “We will bankrupt ourselves in the vain search for absolute security.” (Dwight D. Eisenhower)

Join us for Data Security Breaches Part 4: Wise-Up to Real-Life Impacts.

Tags: , ,

Leave a Reply