Page 2 - Cyber Defense eMagazine - May 2018
P. 2
CONTENTS
CISOs Toughest Battle: Finding the Right Weapons to Fight the Last One Percent of Threats .......... 5
Synthetic Identity Fraud and Social Engineering are Growing Concerns and on the Rise .................. 10
Cloud Direct Connects: The Best Bet for Cyber Security .......................................................................... 15
The case study: Cyber camouflage scenario .............................................................................................. 20
5 Things Everyone Needs to Know About Cybersecurity ......................................................................... 23
Reduced SWaP Will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs .............................. 28
What can we learn about Cyber from the flu? ............................................................................................. 32
On the Clock ..................................................................................................................................................... 35
Don’t Leave Vulnerability Management to Chance ..................................................................................... 42
The Ghost in the Machine (Learning) ............................................................................................................ 46
Regulating Against a Data Breach ................................................................................................................ 49
3 Emerging Technologies Impacting Cyber Security ................................................................................. 55
5 Things the Trump Administration Got Right on Cybersecurity ............................................................. 59
Key Considerations for Identity Governance in the Cloud ........................................................................ 65
Mobile Apps Loaded with Holes Like Swiss Cheese .................................................................................. 70
Data Security in the Digital Era ...................................................................................................................... 74
Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them? ............................... 78
New to Cyber Security Risk Management? Start by answering these questions… .............................. 80
The Seven Stages of GDPR Compliance ...................................................................................................... 84
Some of the world’s biggest crimes go unnoticed, until it’s too late ...................................................... 88
Georgia’s Little Secret Cybersecurity Hub: Enter Augusta… ................................................................... 92
Free Monthly Cyber Defense eMagazine Via Email .................................................................................... 98
Marketing and Partnership Opportunities .................................................................................................... 99
Job Opportunities ............................................................................................................................................ 99
Announcing Winners of the InfoSec Awards 2018 ................................................................................... 100
2 Cyber Defense eMagazine – May 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.