INFORMATION SECURITY MANAGEMENT PART 1

Impact of cyber attack on the business

Cybersecurity and information security, DLT, BLOCKCHAIN and other coin Weaknesess

Cybersecurity and cyberprotection, therminological discrepancy, black hats, blue teas, red teams, white hats.

The pressure over CERT

The pressure over CERT

Cybersecurity is not show!

European institutions and cybersecurity regulations, Reglaments, Directives and other acts

Cybersecurity laws

Organisational forms – CERT, Security Operation Center and corelated sophisticated hackers attack

Cybersecurity Maturity Models and when the thins gonna complicated. Resiliance or prolonged and painful elimination of the consequences of cyber incidents 

Standards. Governance, risk management and compliance

INFORMATION SECURITY MANAGEMENT PART 2

PERSONAL DATA SECURITY

Privacy laws over the world

GDPR entrapments, the cost personal data in the hacker forums, Crime as a Service

Locations of dark data resides

RANSOMWARE BAD PRACTICES OR GOOD PRACTICES

Privacy by design

Measuring emotional contagion and have i’ve been pawned

Metrics implemented for cyberprotection

Third-Party Risk Management

INFORMATION SECURITY MANAGEMENT PART 3

CYBER SECURITY STRATEGY

The challenges of DARK NET, DEEP WEB, SHADOW IT

INSTITUTIONALLY SPONSORED MALICIOUS ACTORS. APT (Advanced Persistent Threats) 

Protecting data, reputation and business

Cybersecurity and  corporate strategy

Communication plan for cybersecurity teams, management and c-level

Information Security Management Systems from the view point of cyberprotection. Asset Management, Change Management and ISMS

Additional references

STUDY OF THE IMBALANCE AND DISPROPORTIONS IN THE OPPOSITION OF CYBER DEFENSE AGAINST HACKERS

The Impacts of DNS Protocol Security Weaknesses

Личните данни начин на употреба (Personal Data the Way They Use It)

GDPR entrapments

Оперативна киберсигурност (Operational Cybersecurity)