Data Security: Raising the Bar for the Mid-Market CLE


Want a discount? Become a member by purchasing 1-Year All Access Pass!


Security initiatives have historically been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. Organizations that used to think “we’re the small company, attackers go for the big organizations with more valuable data” have seen an increase in breaches as attackers shift their focus from the large, heavily secured organizations, to the often easier to breach small, mid, and emerging enterprise businesses.  Automation in attack techniques has made attack targeting more random and democratic, and less protected businesses are experiencing disproportionate impacts.  Shifting from compliance based security to aligning with best practices, specifically the Center for Internet Security (CIS) Top 20 Critical Security Controls, is a great way for an organization of any size to prioritize and progress their security posture.

Ransomware is on the rise and is a serious threat to all organizations. To avoid becoming a victim, businesses should take actions that include putting security processes in place to ensure their IT environment is fully protected. Leveraging the Center for Internet Security’s (CIS) Critical Security Controls (CSC) is a solid place to start. These same security processes will help protect your critical business environment from malware, which accounts for nearly 30% of all breaches.  Once in place, ensuring consistent application of these processes has a recurring benefit in terms of both protection and organizational awareness of security issues.

Join a panel of key thought leaders and practitioners assembled by The Knowledge Group as they delve into the latest data security cases with much consideration on current trends and developments. Speakers will also provide effective tips and strategies to help companies protect their data and secure their company’s most critical assets.

Key topics include:

  • Profile of the latest attacks geared towards small/mid/emerging enterprise sized organizations
  • Leveraging the CIS Controls as a guide for your security practice to prevent breaches
  • Effective strategies for gaining insight to what’s happening to your data
  • Key practices of a security operations center
  • 24/7 Visibility and the battle against drift, dwell time, and lateral spread
  • Likely evolutions in Ransomware and planning for continued protection success