i3 - November/December 2016 - 35

NOW IN ITS
SECOND YEAR,
the CES CyberSecurity Forum presented
by CyberVista is designed to ensure all
stakeholders in developing high tech
solutions understand the complexity
and the need for action in the cybersecurity arena. The Internet of Things,
connected cars, new payment systems,
virtual/augmented reality, wearables,
and our mobile devices all add new
levels of concern to protecting our personal and corporate data. In this daylong conference, we'll tackle the world
of cybersecurity and advocate priority
for security as core value from the very
companies driving innovation.

WHO SHOULD
ATTEND?
The CES CyberSecurity Forum is designed
to bring CES attendees up to speed on

CYBERSECURITY
STARTS AT THE TOP

PROMOTING BETTER
CYBER HYGIENE

According to a May 2016 Ponemon
Institute study, 94% of corporate
executives believe their company will
experience a significant cybersecurity
incident within the next two years,
while 83% feel unprepared and
incapable of resolving such incidents.
Further, the Ponemon Institute also
reported that while 45% of companies
have training and awareness programs
for cybersecurity, nearly one third of
them exempt board members and
executive officers from the training
requirements. So, what should a
company do? How can executives lead
by example? Ask the right questions.
Get trained. Take action.

You floss every day, right? Maybe not every day... Well then, you might be cutting corners on your security hygiene,
too. Go back to basics and get on a regimen - and we mean everyone. Start
security awareness training and data
hygiene best practices.

94%

the percent of executives
expecting a significant
cybersecurity incident
within the next two years

to protect their company assets.

As cybersecurity has increasingly become one of the top strategic priorities
among enterprises, it has become just
as clear that boards and corporate
leadership must have a comprehensive
strategic understanding of cybersecurity issues. This knowledge will allow
leadership to provide the appropriate
support, guidance and resources.

Visit cescybersecurity.com

Breaches may ultimately be inevitable,
but they are no less inevitable than the
physical or financial risks organizations are already adept at addressing.
And, once the culture of security is
established at the top, then education
and training can push deeper into an
organization. Boards and executives
should be driving the charge to ensure the most basic steps are taken
and that starts with cyber hygiene.

the latest threats, impacts, and ways
companies can protect themselves and
their companies. The forum is ideal for
those in the field of cybersecurity, those
looking to get more involved in the field
of cybersecurity, and executives looking

Phishing, fraud and identity theft have
grown insidious and more frequent. The
more complex the attacks, the more
companies need to focus on the fundamentals. A user name and password are
no longer adequate. Industry best practices dictate two-factor authentication
and the use of biometrics. Remember, a
hacker only needs a way in - one time.
Will it be through your email?

ONE PHISH. TWO PHISH...
Phishing is type of social engineering
that attempts to lure a recipient into
clicking on an attachment or URL that
will grant access to the attacker. Phishing emails are so good that employees
get tricked into clicking on them.

30%
the percent of phishing emails
opened by targets in 2015
According to Verizon's 2016 Data
Breach Investigations Report, 30
percent of phishing messages were
opened by the target across all campaigns last year - up from 23 percent in the 2015 report - and 13
percent of those clicked to open the
malicious attachment or link. This all
equates to a lot of access for bad guys.
To protect against phishing attacks,
Verizon recommends that enterprises
implement email filtering, conduct employee awareness training on how to


http://www.cescybersecurity.com

Table of Contents for the Digital Edition of i3 - November/December 2016

Contents
i3 - November/December 2016 - Cover1
i3 - November/December 2016 - Cover2
i3 - November/December 2016 - Contents
i3 - November/December 2016 - 2
i3 - November/December 2016 - 3
i3 - November/December 2016 - 4
i3 - November/December 2016 - 5
i3 - November/December 2016 - 6
i3 - November/December 2016 - 7
i3 - November/December 2016 - 8
i3 - November/December 2016 - 9
i3 - November/December 2016 - 10
i3 - November/December 2016 - 11
i3 - November/December 2016 - 12
i3 - November/December 2016 - 13
i3 - November/December 2016 - 14
i3 - November/December 2016 - 15
i3 - November/December 2016 - 16
i3 - November/December 2016 - 17
i3 - November/December 2016 - 18
i3 - November/December 2016 - 19
i3 - November/December 2016 - 20
i3 - November/December 2016 - 21
i3 - November/December 2016 - 22
i3 - November/December 2016 - 23
i3 - November/December 2016 - 24
i3 - November/December 2016 - 25
i3 - November/December 2016 - 26
i3 - November/December 2016 - 27
i3 - November/December 2016 - 28
i3 - November/December 2016 - 29
i3 - November/December 2016 - 30
i3 - November/December 2016 - 31
i3 - November/December 2016 - 32
i3 - November/December 2016 - 33
i3 - November/December 2016 - 34
i3 - November/December 2016 - 35
i3 - November/December 2016 - 36
i3 - November/December 2016 - 37
i3 - November/December 2016 - 38
i3 - November/December 2016 - 39
i3 - November/December 2016 - 40
i3 - November/December 2016 - 41
i3 - November/December 2016 - 42
i3 - November/December 2016 - 43
i3 - November/December 2016 - 44
i3 - November/December 2016 - 45
i3 - November/December 2016 - 46
i3 - November/December 2016 - 47
i3 - November/December 2016 - 48
i3 - November/December 2016 - 49
i3 - November/December 2016 - 50
i3 - November/December 2016 - 51
i3 - November/December 2016 - 52
i3 - November/December 2016 - 53
i3 - November/December 2016 - 54
i3 - November/December 2016 - 55
i3 - November/December 2016 - 56
i3 - November/December 2016 - 57
i3 - November/December 2016 - 58
i3 - November/December 2016 - 59
i3 - November/December 2016 - 60
i3 - November/December 2016 - 61
i3 - November/December 2016 - 62
i3 - November/December 2016 - 63
i3 - November/December 2016 - 64
i3 - November/December 2016 - 65
i3 - November/December 2016 - 66
i3 - November/December 2016 - 67
i3 - November/December 2016 - 68
i3 - November/December 2016 - Cover3
i3 - November/December 2016 - Cover4
http://www.nxtbook.com/nxtbooks/manifest/i3_20190910
http://www.nxtbook.com/nxtbooks/manifest/i3_20190708
http://www.nxtbook.com/nxtbooks/manifest/i3_20190506
http://www.nxtbook.com/nxtbooks/manifest/i3_20190304
http://www.nxtbook.com/nxtbooks/manifest/i3_20190102
http://www.nxtbook.com/nxtbooks/manifest/i3_20181112
http://www.nxtbook.com/nxtbooks/manifest/i3_20180910
http://www.nxtbook.com/nxtbooks/manifest/i3_20180708
http://www.nxtbook.com/nxtbooks/manifest/i3_20180506
http://www.nxtbook.com/nxtbooks/manifest/i3_20180304
http://www.nxtbook.com/nxtbooks/manifest/i3_20180102
http://www.nxtbook.com/nxtbooks/manifest/i3_20171112
http://www.nxtbook.com/nxtbooks/manifest/i3_20170910
http://www.nxtbook.com/nxtbooks/manifest/i3_20170708
http://www.nxtbook.com/nxtbooks/manifest/i3_20160102
http://www.nxtbook.com/nxtbooks/manifest/i3_20160304
http://www.nxtbook.com/nxtbooks/manifest/i3_20160506
http://www.nxtbook.com/nxtbooks/manifest/i3_20160708
http://www.nxtbook.com/nxtbooks/manifest/i3_20170506
http://www.nxtbook.com/nxtbooks/manifest/i3_20170304
http://www.nxtbook.com/nxtbooks/manifest/i3_20170102
http://www.nxtbook.com/nxtbooks/manifest/i3_20161112
http://www.nxtbook.com/nxtbooks/manifest/i3_20160910
http://www.nxtbookMEDIA.com