Keeping cybercrime in secret |Stories by ISACA Board Member “Radar” Riley
Keeping cyber crime in secret? “Radar” Riley has many coaching stories and a good sense of humor under the hood. The interview focuses on the cyber threats current situation of educational and Oil and Gas industries in general and particularly at Houston, vendor management issues and mindset of acting proactively to cyber threats and fraud.
- Whose responsibility is Information Security? (hint: not only CISO’s)
- Spring breaches in education and students’ “misclicking”
- Does Oil & Gas keep breaches in secret?
- Can you trust 3d party vendors and how to make sure?
“Radar” Riley is a Security Expert, experienced Manager of Information Security, Security and Compliance with an NYSE listed multinational Oil & Gas conglomerate. Also, he is a Board Member of ISACA, an Advisory Board of Houston Community College and many more honoring titles.
His approach teaches how to avoid cybersecurity troubles in your company and establish an armour from cyber fraud and crime in your business environment!
[Kevin Mitnick (The World’s Most Famous Hacker) in Houston, Friday 20Sept 2019 – save the date for a unique Cybersecurity experience with ISACA Houston! Great networking and talks ]
Get the Help You Need
Cybersecurity is our core expertise. Let’s get in touch and you will learn more about how UnderDefense can benefit your organization
Penetration Testing cost.What is the price to avoid bad surprisesBy Iryna YamborskaLet me guess: if you are here - you need a pentest. Customers ask you about pentest, or it is a compliance requirement. Or you are the one who takes care of the state of security of the...
Healthcare ecosystem: Strategies to improve CybersecurityBy Nataly DziobaHealthcare institutions, large and small, have always been a prime target for cybercrime. Lately, healthcare is transitioning from its traditional focus of disease, accidents, etc., toward the...
How to detect CobaltStrike Command & Control communicationBy Bogdan VennykCobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth is explained by the fact that CobaltStrike was leaked multiple times and became more...