Cyber Defense eMagazine August 2020 Edition
Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
● Marketing and security defined the roles and responsibilities for social media and fake accounts.<br />
Using a cross-function approach, Marketing detects an account takeover, and immediately<br />
retakes control. They alert security to the incident.<br />
● Sales can work with marketing and security to initiate a takedown of any fake account. Such<br />
accounts are detected by technology that actively crawls the internet (both surface and dark)<br />
around the clock.<br />
● A compliance officer is notified that a message sent by a rep might contain an issue, because<br />
compliance and sales have agreed on what channels need monitoring. The message has been<br />
quarantined so it can be checked before it is allowed to be sent.<br />
The Future of Security is by Design<br />
A Security by Design framework enables enterprises to properly protect themselves, and move from a<br />
reactive stance, where a crisis is always around the corner, to a proactive stance. Security by Design is<br />
the only sensible approach in an era where so many business-critical tools live outside the traditional<br />
perimeter, and modern digital risks are so numerous, complex, and sophisticated.<br />
Security by Design is also the only sensible approach for enterprises that want to do everything they can<br />
do to drive growth. When a Security by Design framework is properly implemented, security becomes a<br />
driver of business success. Executives and board members can view digital security as achieving a<br />
positive goal that helps drive business growth. Security becomes synonymous with revenue. When<br />
properly safeguarding the organization is understood as simple financial prudence, including security at<br />
the inception of a product or service becomes an obvious best practice. This view of security is the future.<br />
About the Author<br />
Jim Zuffoletti has been a founder of start-up organizations as<br />
both an entrepreneur and an intrapreneur for the past twenty-five<br />
years. Jim is CEO and co-founder of SafeGuard <strong>Cyber</strong>, a digital<br />
risk protection company securing brands, VIPs, and team<br />
members in the new world of social media and digital<br />
communications. Jim was previously CEO and President of<br />
OpenQ which enabled pharmaceutical, biotech, and medical<br />
device companies to discover, regulate, and leverage the social<br />
networks forged with outside influencers and researchers. Jim<br />
Zuffoletti can be reached at our company website at<br />
www.safeguardcyber.com.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 26<br />
Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.