Companies that successfully navigate cyberthreats are twice as successful as others in their segments (Forbes Intelligent Systems Research, May 2021).
Identifying assets and ensuring that they are protected now and in the future is a critical requirement. A systematic evaluation approach is essential.
What you will learn:
- How the CIA triad functions as a security framework
- A systematic approach to evaluating security
- Examples of security implementation
Speaker
Kevin Jonestrask
Principal Technologist
Wind River