Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

How Can You Find Out Where Your Businesses' Weakest Security Points Lay At

  • Broadcast in Technology
Cyber Security News

Cyber Security News

×  

Follow This Show

If you liked this show, you should follow Cyber Security News.
h:734947
s:11012503
archived

In the Cyber threat landscape of today, there are literally tons of risks and threats out there.  It is almost impossible to keep up with all of this.  This world is like a cat and mouse game, where the Cyber attacker is the cat, and you are the mouse, the victim. 

The Cyber attacker can come out at you with everything that they have in their arsenal.  They can target anything ranging from your Web applications, to your servers, to your Critical Infrastructure, your Intellectual Property, your customer information/data, and yes, even your employees.

Thus, it is imperative that you enhance your lines of defense both internally and externally.  One of the best ways that you can achieve this is through Penetration Testing.  This is where teams of Cyber security experts come together and attack your both your physical and digital infrastructures just like in the real world. 

From here, any unknown vulnerabilities and weaknesses can be discovered, and remedies found.  But how do you exactly go about doing such a thing?  Well, in today’s podcast we have the honor of interviewing John Linkous, the Managing Director at Fortalice Solutions. 

They offer these kinds of services, as well as many others, including how to thwart off Insider Attacks, which is now a looming threat today in Corporate America.

Dial in to learn how to you can further beef up your defenses and stay ahead of the proverbial cat and mouse game!!!

Here is some more about John's background:

John began his career at NASA where he was the recipient of the Goddard Space Flight Center’s “Individual Contractor of the Year” award in 1993. He also worked as an independent consultant for many years, serving as an outsourced CISO and CTO for various organizations. 

Comments