REMINDER: Attendance at training sessions, unless pre-registration is required, is first-come basis. Creating an agenda via SCHED or the mobile app does not guarantee a place in the session.
A comprehensive and effective Cyber Security Strategy consist of multiple layers. We will briefly touch on the first and second layers which include: Firewalls, End-point protection, Intrusion Protection Systems, Malware Detection, Social Engineering, and Analytics. We will focus most of our time discussing the third and sometime most ignored layer which is Backup, and Disaster Recovery (DR). You will learn how a seamless and well-integrated Backup/DR strategy will significantly augment your overall Cyber Security Strategy.