How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

  • Date 04 Jun 2019

How Continuous Network Monitoring & Risk Scoring will Eliminate most Commodity Cyber Threats in Small Networks

04 Jun 2019, 11:45 - 12:00

Cyber Innovation Showcase
Language:
English

There are five technical information security controls that if implemented correctly are known to eliminate 95% of cyber attacks. These are well documented as part of Cyber Essentials.

Why are small businesses not adopting these controls and endangering their big clients and the global economy? And why can’t the big corporates have visibility and confidence in their supply chains and homeworkers?

Continuous monitoring of these controls not only reduces business risk, but also allows Managed Service Providers to pro-actively educate their customers whilst creating a greater bond and reducing churn.

By creating a “cyber risk score”, supply chain and Enterprise homeworker networks are “air-gapped” and can be monitored by security operation centres without the loss of privacy.

Learning Outcomes:

  1. Understand the importance of continuous network monitoring
  2. Find out how this can speed up the adoption of Cyber Essentials Certification
  3. How to use network monitoring to assess and score risk
  4. Discover how network monitoring can help secure Supply Chains
  5. Enhance the security of your Enterprise Home Workers

 

Contributors

  • Tim Moran

    Speaker

    Founder & CEO

    LuJam Cyber

    Tim is the Founder and CEO of LuJam Security. An ex Cold War Submariner, Tim now has more than 30 years’ experience in IT Networking, Cyber Security...

Business Issues covered

  1. What will this session help you to do?
    • Build a robust cyber response and resilience strategy
    • Deliver security to drive and enable business growth‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

LuJam Cyber

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.