INFORMATION SECURITY MANAGEMENT PART 1
Impact of cyber attack on the business
Cybersecurity and information security, DLT, BLOCKCHAIN and other coin Weaknesess
Cybersecurity and cyberprotection, therminological discrepancy, black hats, blue teas, red teams, white hats.
Cybersecurity is not show!
European institutions and cybersecurity regulations, Reglaments, Directives and other acts
Cybersecurity laws
Organisational forms – CERT, Security Operation Center and corelated sophisticated hackers attack
Cybersecurity Maturity Models and when the thins gonna complicated. Resiliance or prolonged and painful elimination of the consequences of cyber incidents
Standards. Governance, risk management and compliance
INFORMATION SECURITY MANAGEMENT PART 2
PERSONAL DATA SECURITY
Privacy laws over the world
GDPR entrapments, the cost personal data in the hacker forums, Crime as a Service
Locations of dark data resides
RANSOMWARE BAD PRACTICES OR GOOD PRACTICES
Privacy by design
Measuring emotional contagion and have i’ve been pawned
Metrics implemented for cyberprotection
INFORMATION SECURITY MANAGEMENT PART 3
CYBER SECURITY STRATEGY
The challenges of DARK NET, DEEP WEB, SHADOW IT
INSTITUTIONALLY SPONSORED MALICIOUS ACTORS. APT (Advanced Persistent Threats)
Protecting data, reputation and business
Cybersecurity and corporate strategy
Communication plan for cybersecurity teams, management and c-level
Information Security Management Systems from the view point of cyberprotection. Asset Management, Change Management and ISMS
Additional references
STUDY OF THE IMBALANCE AND DISPROPORTIONS IN THE OPPOSITION OF CYBER DEFENSE AGAINST HACKERS
The Impacts of DNS Protocol Security Weaknesses
Личните данни начин на употреба (Personal Data the Way They Use It)
Оперативна киберсигурност (Operational Cybersecurity)