GreyCastle Security Will Lead Cybersecurity Discussions at Upcoming New York State Cyber Security Conference & 11th Annual Information Assurance Symposium

Share Article

CEO Reg Harnish and Senior Security Strategist Keith Robertson to discuss cybersecurity risks posed by third parties and the privacy versus security paradox

News Image
In an increasingly digitized world, we would rather trade our data than to miss out on our online experience.

CEO Reg Harnish and Senior Security Strategist Keith Robertson of GreyCastle Security, a leading cybersecurity consulting firm focused on risk management, awareness and incident response with Fortune 500 and Global clients, will lead discussions on Wednesday, June 8 at the 2016 New York State Cyber Security Conference and 11th Annual Symposium on Information Assurance. Harnish will discuss the irony of privacy and security in a connected world at 1 p.m. while Robertson will discuss the cybersecurity risks posed by third-party contractors and vendors at 2:10 p.m.

Established in 1997, the New York State Cyber Security Conference brings together over 1,000 industry professionals to discuss how to identify and prioritize risks to be prepared for a cyber attack. Data breaches have touched nearly every industry. Attendees will hear from leading experts about their personal experiences responding to attacks and learn the necessary steps to minimize their own risks.

Harnish will give attendees a provocative and realistic look at privacy demands versus user habits and expectations.

“Our digital world is broken and that's just how we like it. We have come to expect our privacy yet we donate our deepest, darkest secrets to Google search histories,” says Harnish. “In an increasingly digitized world, we would rather trade our data than to miss out on our online experience.”

Harnish will discuss the following:

Hell is Empty and All the Devils Are Here – Wednesday, June 8 at 1 p.m.
The right to privacy has become the corollary to the assurances of security -- both counter-intuitive in the information age and ironic in their implementations. Security does not necessarily help nor hinder privacy, and privacy cares as much about security as it does about bowling. They are not often interconnected, and even when they are they oscillate independently. Agree or disagree, because it doesn't matter anyway. Privacy has become a currency -- the only one accepted at Internet endpoints all over the world. It's a pay-to-play world, and while we reluctantly eat the cookies of our Internet favorites, we collectively decide that a diet of digital abstinence tastes far worse. Our data collectors lack transparency, and we're okay with that. We donate our deepest, darkest secrets to Google search histories while posting our rants about privacy rights on Facebook. The system is broken and that's just how we like it. Join GreyCastle Security as we explore the ironies of privacy and security in a digital world. Attendees will be provided a fresh and thought-provoking twist on how to survive on a diet of poisoned fruit.

Robertson will guide attendees through a plan for managing vendor risk, an avenue increasingly exploited by hackers.

“Third-party contractors and vendors have become a common component to doing business. As an extension of your company, third-parties introduce a backdoor to hackers looking to breach your system,” says Robertson. “It is vital to develop a plan that extends your internal controls to your external systems.”

Robertson will discuss the following:

Vendor Risk; The Back Door You Can't Leave Unlocked – Wednesday, June 8 at 2:10 p.m.
As we've seen time and time again, cybercriminals take the path of least resistance. Based on recent high-profile breaches, hackers have learned that contractors and other third-party providers can provide an opening into otherwise-secure corporate networks. You've spent time, money and energy securing your organization internally, only to leave the back door wide open. How can you extend your internal security controls to your vendors and help reduce your organization's risk? Join GreyCastle Security for an in-depth look into vendor risk management. Learn what's working, what's not, and how your organization can better manage one of the most challenging security issues facing organizations today.

Members of the media interested in speaking with CEO Reg Harnish or Senior Strategist Keith Robertson can contact Liz Hilton at ehilton(at)crosswindpr(dot)com. For more information on GreyCastle, visit http://www.greycastlesecurity.com.

 # # #

About GreyCastle Security:
GreyCastle Security is a cybersecurity consulting firm focused on risk management, awareness and operational security. Our company was established to counter rapidly evolving cybersecurity threats and manage risks in people, processes and technology. GreyCastle Security is comprised exclusively of highly certified professionals with prior security experience in healthcare, education, retail and gaming. Our team members are all former CISOs, ISOs, security specialists and operators. We bring a client perspective to everything we do. All we do is cybersecurity -- all day, every day. We provide assessments, training, testing and response capabilities to organizations of all sizes, types and industries. We bring passionate practicality to cybersecurity. Visit us at http://www.greycastlesecurity.com for more information, and let GreyCastle Security redefine cybersecurity for you

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Elizabeth Hilton