Key Takeaways of the US Cybersecurity Executive Order

Jul 29, 2021

Start Date : Thursday, Jul 29, 2021

End Date : Thursday, Jul 29, 2021

Time (IST) : 03:00 PM - 04:00 PM

Time (UTC) : 03:30 AM - 04:30 AM

Services Offered :

Speaker(s) : Anupam Srivastava, Jerry Leishman, Keith Frederick, Marc Lessem, Krishnanand Bhat, Supriya Anchan

The webinar started off with a brief introduction of recent data breaches, the kinds of cyberattacks, causes, and methods of prevention that organizations can take. Supriya Anchan from Technology Advisory at Nexdigm talks about cyber security for individuals, organizations, and nations.

The panelists touched upon the White House directive regarding Cyber Security and its relevance in recent times. Along with that, the panelists offered their take on the effectiveness of certain regulations such as the Cloud Act, HIPAA, the Department of Defense requirements, etc.

To this, Anupam Srivastava - Vice President of International Strategy and Business Development, Safe-Zone Ltd states that “the effectiveness of these regulations follows the law of diminishing returns.” This is because cybercriminals can adapt to these regulations and find means of bypassing them. Since the internet is a highly dynamic environment, rather than enforcing a few regulations from time to time, there needs to be constant alterations and monitoring to ensure that organizations are one step ahead of the criminals.

Jerry Leishman – Executive Vice President and National Security & Compliance Director at CORTAC Group, provides some interesting numbers for the negligence cost of cyber security and compares it with the global drug trade valuation. He further addresses the steps taken by the Government of the United States to improve cyber security amongst industries.

Next, the panelists discussed what council and immediate response a cyber security firm would provide to a cyberattack target. Here, Keith Frederick – Chief Information Security Officer (CISO) at Viasat Inc. added some precise steps that a victim organization would be asked to take. He iterates how important it is to understand the cause of the breach, as it helps tighten security and prevent repeat attacks.

The panelists then discussed the zero trust architecture that various organizations are implementing. Along with that, the panel was also asked to shed light on the other preemptive policies and measures that can minimize the occurrence of cyberattacks. They highlighted the importance of an organization following good security hygiene, such as setting strong passwords, changing firewalls, keeping software up to date, etc.

In conclusion, the panel addressed how important it is to constantly evolve in a dynamic environment such as the internet and practice good security hygiene. If, unfortunately, an attack takes place, one must prioritize the running of daily operations while at the same time diagnosing the cause of the attack and then optimizing from there.

Past Events

08 Nov 2022
Tuesday, 12:00 AM

Services Offered :

Speaker(s) : Trupti Mehta, Lokesh Gupta

01 Sep 2022
Thursday, 08:30 PM

Services Offered :

Speaker(s) : Amit Kumar, Peter Rose, Dhiren Kanwar, K.S. Narayanan, Marc Lessem

Industry : Food Processing,

12 Jul 2022
Tuesday, 03:00 PM

Services Offered :

Speaker(s) : Maria Tzagournis, Michael Beckstead, Kirk Samson, Marc Lessem

30 Jun 2022
Thursday, 12:00 PM

Services Offered :

Speaker(s) : Trupti Mehta

11 May 2022
Wednesday, 04:30 PM

Services Offered :

Speaker(s) : Sameet Gambhir, Jaykumar Shah, A.K. Viswanathan, Maulik Doshi

Join our mailing list To receive our latest insights

Enquire Now

Or

Reach out to us at ThinkNext@nexdigm.com