Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely crucial that the risk and consequences of a data breach transcends to the public. Confidentially is the 1st tenant in the CIA triad. For those who may not be aware, CIA Is confidentiality, integrity, and availability. Together, these three principles form the cornerstone of any organization’s security infrastructure.
Alexandre Blanc became cyber risk subject matter expert, from local infrastructures to global threat landscape analysis through 20+ years of infrastructure management, protecting and securing systems from online threats. He loves to correlate information from OSINT, and draw global trends in cyber threat landscape. His hands on experience on protecting sensitive infrastructures, combined with daily threats trend analysis and awareness raising, brought him to an essential position in regard to risk analysis overview, information sharing, from low to high level perspectives.
He joins me at the bar to discuss prime attack vectors, Ransomware defense, data exfiltration, Incident Response, and more.
SYMLINKS
LinkedIn
Twitter
Blog
VARS Corporation
The Keg Restaurant – Montreal
DRINK INSTRUCTION
DEATH FLIP
1 oz Blanco Tequila
1/2 oz Jagermeister
1/2 oz Yellow Chartuese
1 Dash Simple Syrup
1 Whole Egg (White & Yolk)
Add ingredients to tin. Make sure you don’t get any egg shell into the cocktail. Add shaking ice. Shake 8-10 seconds. Strain into chilled glass.
CONNECT WITH US
http://www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at info@barcodesecurity.com