Keeping cybercrime in secret |Stories by ISACA Board Member “Radar” Riley
Keeping cyber crime in secret? “Radar” Riley has many coaching stories and a good sense of humor under the hood. The interview focuses on the cyber threats current situation of educational and Oil and Gas industries in general and particularly at Houston, vendor management issues and mindset of acting proactively to cyber threats and fraud.
- Whose responsibility is Information Security? (hint: not only CISO’s)
- Spring breaches in education and students’ “misclicking”
- Does Oil & Gas keep breaches in secret?
- Can you trust 3d party vendors and how to make sure?
“Radar” Riley is a Security Expert, experienced Manager of Information Security, Security and Compliance with an NYSE listed multinational Oil & Gas conglomerate. Also, he is a Board Member of ISACA, an Advisory Board of Houston Community College and many more honoring titles.
His approach teaches how to avoid cybersecurity troubles in your company and establish an armour from cyber fraud and crime in your business environment!
[Kevin Mitnick (The World’s Most Famous Hacker) in Houston, Friday 20Sept 2019 – save the date for a unique Cybersecurity experience with ISACA Houston! Great networking and talks ]
Get the Help You Need
Cybersecurity is our core expertise. Let’s get in touch and you will learn more about how UnderDefense can benefit your organization
Russian Cybercriminals "Armageddon Group" Spreading New Tricky Phishing Emails with Great Deanonymization FlowOn April 4, 2022, the government emergency response team of Ukraine CERT-UA has warned of a massive spear-phishing campaign launched by a hacking group...
Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analystby Iryna Yamborska1. What are Splunk ES and Elastic (ELK) Stack? 2. Main Differences Between Splunk ES and Elastic (ELK) Stack 3. Summary Comparison 4. ConclusionThe modern digital and globalized world...
Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104)by Iryna Yamborska1. What is Log4Shell? 2. What makes Log4j uniquely dangerous even though you seem protected 3. Which Version is not affected? 4. How to Mitigate the...