April 25, 2019 by Siobhan Climer
In the month of February alone, 692,853,046 records were breached, bringing the total number of breached records in 2019 to almost 2.5 billion . What could businesses tasked with preventing these data breaches and cyber attacks have done differently?
On May 2nd, learn how to prioritize your cybersecurity approach and tackle the low-hanging fruit in your security posture. By understanding the big picture, IT leaders can make informed security decisions that protect their data.
Join Mishaal Khan, Mindsight’s Senior Security Solutions Architect, Certified Ethical Hacker, CCIE R&S, Security Practitioner, and Certified Social Engineer Pentester as he lays out the current state of cybersecurity and what specific steps executives can take toward securing the business.
Event Discussion Topics
- The Cybersecurity Landscape
- Cybersecurity Foundations: A House, A Home Model
- Risk Prioritization and Assessment
- Cybersecurity Frameworks
- The Feedback Loop – An Ongoing Process
Khan will offer insights into the often murky world of cybersecurity. With his multinational perspective, Khan will cover cybersecurity basics, risk prioritization through assessments, prominent cybersecurity frameworks, and the importance of visibility, monitoring, disaster recovery, and testing in hardening your security posture. Khan will draw on his creative background to illustrate – literally – how your business can have a resilient cybersecurity strategy with the right information security foundations.
- 11:00 am – 11:30 am: The Cybersecurity Landscape
- 11:30 am – 12:15 pm: Cybersecurity Frameworks and The Feedback Loop
- 12:15 pm – 12:30 pm: Q&A Session
- 12:30 pm – 1:30 pm: Lunch and Networking
Presenter: Mishaal Khan, Security Solutions Architect
Mishaal has been breaking and – thankfully – rebuilding computers for as long as he can remember. As a Certified Ethical Hacker (CEH), CCIE R&S, Security Practitioner, and Certified Social Engineer Pentester, Khan offers insight into the often murky world of cybersecurity. Khan brings a multinational perspective to the business security posture, and he has consulted with SMBs, schools, government institutions, and global enterprises, seeking to spread awareness in security, privacy, and open source intelligence.
Can’t Make This Chicago Tech Event?
While we hope you can join us on May 2nd, we know your time is valuable, your schedule is busy, and you may very well be a long way from Chicago, IL. If that’s the case, be sure to join us for our (free!) weekly whiteboard sessions. Our expert engineers and architects are ready to offer an outside perspective on the most pertinent challenges you face.
Like what you read?
Contact us today to discuss cybersecurity frameworks and securing your business.
Mindsight, a Chicago IT services provider, is an extension of your team. Our culture is built on transparency and trust, and our team is made up of extraordinary people – the kinds of people you would hire. We have one of the largest expert-level engineering teams delivering the full spectrum of IT services and solutions, from cloud to infrastructure, collaboration to contact center. Our highly-certified engineers and process-oriented excellence have certainly been key to our success. But what really sets us apart is our straightforward and honest approach to every conversation, whether it is for an emerging business or global enterprise. Our customers rely on our thought leadership, responsiveness, and dedication to solving their toughest technology challenges.
Contact us at GoMindsight.com.
About The Author
Siobhan Climer, Science and Technology Writer for Mindsight, writes about technology trends in education, healthcare, and business. She previously taught STEM programs in elementary classrooms and museums, and writes extensively about cybersecurity, disaster recovery, cloud services, backups, data storage, network infrastructure, and the contact center. When she’s not writing tech, she’s writing fantasy, gardening, and exploring the world with her twin two-year old daughters. Find her on twitter @techtalksio.
Strengthen Your Security Posture: Start With A Cybersecurity Framework