The buzz: Spelling bee.
Cybersecurity breaches in the headlines continue to strike fear in the hearts of companies, governments and individuals worldwide.
For businesses, the advent of the IoT [Internet of Things] can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications – which has been a long-standing no-no.
With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between your 30-year-old sensors that lack modern Internet protocol support?
The experts speak.
Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SECRET ICY RUBY – ICE CURRY BYTES – I RUT BY SECRECY.” (Anagram generator)
Hillel Zafir, HMS Technology Group: “Let’s start at the very beginning, a very good place to start. When you read you begin with A B C…” (“Do Re Mi” from The Sound of Music, sung by Maria and the Von Trapp Children)
Richard McCammon, Delego: “We will bankrupt ourselves in the vain search for absolute security.” (Dwight D. Eisenhower)
Join us for Data Security Breaches Part 4: Wise-Up to Real-Life Impacts.