December 5 - 8, 2016 | New Orleans
While the motive behind cyber-attacks can differ, the techniques are often the same. A threat intelligence program analyzes the actors, motives, techniques, and vectors of attack.
December 8, 2016 | New Orleans
Risk Management is a critical part of every company’s control environment. Across the organization, growing cyber threats, network integration with third parties, the risk of financial fraud, and more all contribute to the need to effectively measure, manage, document, and communicate risk across the company. It’s not enough to implement policies, procedures, and tools and hope they stop risk events from materializing.