2. INTERVIEW HIGHLIGHTS
However, that being said, it is becoming increasingly obvious that our world
is Each time I fail, I use that as an opportunity to evaluate how I can do better.
In this way, I am continually improving. The encouragement of my wife has
been very important. She encourages me to keep going when I hit setbacks.
Every success is born out of other
failures.
3. INTERVIEW HIGHLIGHTS
And they should employ it in a variety of fashions such as encrypting their hard
drives, archive storage, communications, and browsing. Some think that
encryption means you have something you are ashamed of and, therefore, if
you use encryption, you must be doing something wrong.
People should use encryption.
4. INTERVIEW HIGHLIGHTS
None of us would consider leaving the house naked. Those who dream of it
usually wake with anxiety and fear. We clothe ourselves, not because we are
ashamed, but because that is a private part of our self that we do not want to
share with just anyone. In the same way, our data and personal information is
private to us. We do not need to share it with others so we must clothe it in
encryption.
Our privacy is important and not
something we want to lose.
5. INTERVIEW HIGHLIGHTS
Encrypt data on storage devices using hard disk encryption. The most sensitive
files should use file-based encryption on top of drive encryption. Keep keys in
a safe place. You could physically print them out and store them in a safe.
Encrypt your browsing by using a VPN and ensure that you are connected over
HTTPS/TLS when entering information online.
To secure your data, you must first
understand where it is and how
and when it is shared.
6. INTERVIEW HIGHLIGHTS
The same technologies that secure businesses and provide organizational value
are used to attack businesses and reduce organizational value. For example,
machine learning is used to identify malicious attacks by companies, but
attackers use it to identify more likely targets and entry points.
Cyber security has always been a
bit of an arms race because
technology works both ways.
7. INTERVIEW HIGHLIGHTS
The burgeoning IoT adoption rate will require larger and more distributed
monitoring systems, more complex vulnerability management solutions, and
automation and orchestration to make the management of so many devices
feasible for the average company.
By 2020 there will be 31 billion
devices connected to the internet
including IoT devices.
8. INTERVIEW HIGHLIGHTS
Consumers should also understand what information is collected by companies
so that they can make an informed decision as to whether they will use the
product. Adoption of the privacy provisions in the GDPR will go a long way to
establishing more transparency of the information collected and it will give
consumers more control over how that information is used and when it is
removed or transferred.
It is important to review privacy
policies to understand how your
information will be used.
9. INTERVIEW HIGHLIGHTS
The changes to the privacy rules and net neutrality will not change this. The
Internet’s primary purpose will remain. However, consumers still bear part of
the burden to protect their information so using a VPN to connect to the
Internet is an easy, cost-effective way to protect privacy.
The Internet will still be a place of
innovation and hub for
exchanging information.
10. INTERVIEW HIGHLIGHTS
And they are essential for understanding and securing organizational systems
and data. However, they are only part of the solution. Organizations must
consider more than just technology. Processes and people must be addressed
through governance and training initiatives to provide a holistic, balanced
approach.
Firewalls, IDS/IPS,
Antivirus/antimalware, and SIEM
are part of an overall
cybersecurity framework.