Rush to Telecommuting = Target-Rich Environment for Cyber Criminals
As cyber criminals continue their unrelenting assaults and expand their techniques to take advantage of the opportunities created by COVID-19 fears, cybersecurity teams should be sure to keep pace with the new types of threats. This challenge will be even more pronounced as we strive to preserve business-as-usual by initiating telecommuting programs. As these programs are implemented, cyber criminals are also taking advantage of new vulnerabilities created by the rush to mass telecommuting.
Join us Thursday, March 26 at 2PM EDT for an expert-panel webinar that will offer advice for managing your remote workforce and ensuring security during these unprecedented times. Key takeaways from this session include:
- How should employees securely connect from home to the company network?
- What policies and procedures do you need to implement so remote users do not overwhelm your network’s capacity?
- Why authentication of remote users and limiting their access to the company network is so important?
- Which cyber threats you should expect to encounter specifically related to Coronavirus?
Ample time will be allotted for live Q&A during the broadcast.
Marc Debrody, CISM, U.S. Secret Service Electronic Crimes Task Force
Assistant to the Special Agent in Charge (ATSAIC) Marc Debrody is a twenty-four (24) year veteran with the United States Secret Service and has nearly twenty-seven (27) years in law enforcement serving previously with the City of Atlanta Police Department. Currently assigned to the Atlanta Field Office, ATSAIC Debrody oversees the Electronic Crimes Task Force (ECTF) responsible for conducting computer related crimes investigations to include Business Email Compromise (BEC), Ransomware, computer/mobile forensics, and network intrusion/data breach investigations in partnership with task force members. As one of forty (40) ECTF’s across the country, the Atlanta ECTF is comprised of over 400 local/state/federal law enforcement officers, members of private industry, and academia each with a common goal of sharing information to combat crimes against our nation’s financial infrastructure. As a Certified Information Security Manager (CISM), ATSAIC Debrody and his team regularly engage industry partners to communicate best practices and cyber-intelligence.
Jodi Daniels, CEO & Privacy Consultant at Red Clover Advisors
Jodi Daniels is Founder and CEO of Red Clover Advisors, a privacy consultancy, helping companies create privacy programs, build customer trust and achieve GDPR, CCPA, and US privacy law compliance. Jodi helps companies with daily operations such as data mapping, individual rights, training, policies, etc. and also serves as a fractional chief privacy officer.
Justin Daniels, Business Attorney & Cybersecurity Expert at Baker Donelson
Justin Daniels is a cybersecurity thought leader who believes cybersecurity is a strategic business enterprise risk. He brings a cyber lens to business and legal issues in operations, mergers and acquisitions, investment capital transactions and related due diligence matters, information security plans, and vendor and customer contracts. He conducts realistic industry-specific cyber breach incident response tabletop exercises that facilitate the board and C-suite identifying and addressing gaps in their thinking on cybersecurity issues. He completed a Harvard course entitled "Cybersecurity: Managing Risk in the Information Age in March 2019.
Justin is a leader in Georgia's cybersecurity industry. In 2015, he started Cybercon, a cyber conference that brings together leaders from business, government and academia to discuss the evolving cybersecurity landscape. In 2018, the Equifax CISO keynoted Cybercon and the U.S. Army Cyber Command commanding general also participated. He founded and led Atlanta Cyber Week (www.atlcyberweek.com) in 2017 and 2018 where Cybercon anchored 11 events that attracted more than 1,000 attendees from five countries. At the end of Atlanta Cyber Week 2017, he gave a Ted Talk entitled "Why You Hold the Key to Cybersecurity." He speaks extensively about the topic of cybersecurity and blockchain and has done so in the United States, the UK and Israel.
Additional Cybersecurity Resources
- Business Continuity Plan Template
- Disaster Recovery Plan Template
- Access Control Policy Template
- Additional Cybersecurity Policy Templates