ECCU

Cyber Extortion: Traditional Blackmail with a Cyber Twist

Ransom, extortion or blackmail, regardless of the name, hackers are breaking into network systems encrypting the data and holding it hostage. These age-old activities are being married to modern technology and wreaking havoc. They have become one of the fastest-growing technologies in cyber crime. Whether you are in retail, manufacturing, the hospitality sector, or an…

Webinar

Is Physical Security important in the cyber world?

Title: Is Physical Security important in the cyber world? Presenter: Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Description: Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security…

The Ultimate goal: To manage Information Security Governance and Risk Management

Title: The Ultimate goal: To manage Information Security Governance and Risk Management Presenter: James D. Reeves | Senior Professional Staff II at Johns Hopkins University Applied Physics Laboratory Description: This Common Body of Knowledge Workshop is one where “the rubber meets the road.†In this workshop we will discuss the means for managing security for…

Webinar September 18 2014

Maintaining Operational Security in Today’s Ever-Changing Landscape

Title: Maintaining Operational Security in Today’s Ever-Changing Landscape Instructor: Dr. Michael Goldner Description: Our Cyber world is constantly evolving and becoming more challenging almost on a daily basis. So if your Network and operating systems are secure one week, they might not be the next. Thus, we have the concept of Operational Security (OpSec) which…