Danger from Within – Cybersecurity and Governance
The greatest threat to cybersecurity may be employees or vendors
Recent research at Oxford University and a 2014 Harvard Business Review article observed cyberattacks involving insiders – employees, vendors, consultants and others connected to the organization’s computer system – as pernicious and on the rise … accounting for 20% of all cyberattacks. Further, research indicates that widely used safeguards are ineffective against them. This course examines where counties are most vulnerable and best practices to significantly reduce the risk of unintended release of county data and information. The focus is on establishing effective and practical policies and procedures for reducing vulnerability, and reviewing the governance of county IT systems. Course highlights steps managers, executives and elected officials should consider to ensure security of county and client information. Ideal for managers, executives, elected officials as well as those managing IT systems and system security.
Instructors: Cybersecurity experts from Dell Computer and Pay Per Cloud.