Email is the backbone of modern business operations and what business process is not supported in some way or another by these systems?!When the SECURITY community thinks email, we envision MFA, password resets, personal and professional contacts, secret messages to significant others, financial information, and individual schedules.
When BUSINESS stakeholders think email, we think swift communication, transcript of conversations, reference document repository, task list, and meeting details.
When LEGAL representatives think email, they think about production document cache, business process, human relationships, and evidence.
Are we considering what is not in our email?
Join us to learn ways to protect and secure your organization against the changing threat landscape. Key discussion points:- Primary attack vectors
- Key security controls
- How culture drives security and privacy
- Frameworks basics and governance
- Best practice recommendations
- Automation and standardization approaches
- Metrics and reporting suggestions
You will leave with:- A high-level understanding of risk and controls
- An approach and methodology for assessing maturity
- Framework references with relevant sections
- Sample templates to baseline maturity
- Best practices checklist