Foundations for Prevention and Mitigation This article focuses on the professional expertise, processes, and technologies that are needed to mitigate the ever-increasing risk of cyber-attacks and potential business interruptions on companies, organizations, and individuals. The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information/data security and privacy evolve at the speed of the technical innovations driving progress. Within this dynamic ecosystem, we are increasingly connected across the globe, where organizations (and individuals) equally face the ever-present threat from cyber-attack. No one is immune and…
-
-
Today’s competitive market helps to create the attraction and real possibility of employee mobility. James Pooley, author of Secrets: Managing Information Assets in the Age of Cyberespionage (Verus Press 2015), shares nine insightful tips every employer should consider and put in practice to protect themselves and their companies. Find out more on the RIA Biz article, click: Ways to ensure your firm’s secrets remain in-house when employees leave.