Protecting Ourselves from Cyberterrorism
Carol Stream, IL (PRWEB) December 22, 2014 -- Sony Pictures. Target. Home Depot. Some of the world’s largest companies have recently fallen victim to a cyber attack. UC (unified communication) providers, such as AT&T, suggest compromises to the networks can cost companies upwards of $4 billion a year. Could it happen to your company? Most likely, the answer is yes.
James Clapper, U.S. director of National Intelligence stated that cybercrime is the top national security threat, ranking higher than terrorism, espionage, and weapons of mass destruction.
“Protecting your company from cyberterrorism has to be your primary objective,” says Peggy Smedley, editorial director, Connected World magazine. “Cyber attacks and breaches are a constant, and even relentless threat to the security of an organization, the government, and individuals. And now, these threats are pivoting from data theft to the even more damaging destruction of infrastructure.”
Can we anticipate what is to come? What is the best strategy to put forth to protect corporate and personal assets? Which steps are necessary to implement protection? These are the questions that must be asked and answered.
Scott Schober, president and CEO, Berkeley Varitronics Systems, and cyber security expert, assess the state of these threats today. “In global economics, cyber threats can become hacks which quickly amount to cyberterrorism,” says Schober. “Recent attacks against Sony Pictures have drawn clear battle lines between those that wish to do business and those that wish to harm our business and way of life. This is a shot across our bow and must be addressed."
Connected World magazine, in partnership with University of Alabama at Birmingham’s Center for Information Assurance and Joint Forensics Research (The Center), looks to tackle these concerns with the 2015 Connected World Conference.
The summit, held Feb. 23-24, 2015 at the Birmingham Marriott in Alabama, will convene industry, government, and academia leaders in order to unravel the relationship between the connected society and cybersecurity, ultimately creating a solution and strategy to address these critical infrastructure and data issues.
According to Gartner, by 2015 some 75% of mobile apps will not pass basic security tests. Companies admit that a loss of confidential information is a real threat and that many do not get essential realtime alerts, threats analysis, and threat prioritization intelligence which are essential to prevent a critical attack.
“One challenge that must be addressed is that of developing a competent cybersecurity workforce. Business, industry, government, and academia must partner to insure that college students interested in careers in cybersecurity and digital forensics have the best possible training. For that to happen, resources―sponsored scholarships, cooperative programs, and internships―must be allocated by all of the stakeholders,” says John Sloan, Ph.D., director, UAB Center for Information Assurance and Joint Forensics Research. “The Connected World Conference is an exciting opportunity to bring these key stakeholders together in Birmingham, whose technology sector is growing by leaps and bounds.”
To learn more about the 2015 Connected World Conference, please visit the event Website.
About Connected World Magazine
Connected World is the business and technology publication that provides the intelligence industry titans need and the guidance consumers crave. It’s all about M2M. connectedworld.com
###
Michelle Mayer, Connected World magazine, http://connectedworld.com/, +1 630-933-0844 Ext: 246, [email protected]
Share this article