03.08.2020 Views

Cyber Defense eMagazine August 2020 Edition

Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

● Marketing and security defined the roles and responsibilities for social media and fake accounts.<br />

Using a cross-function approach, Marketing detects an account takeover, and immediately<br />

retakes control. They alert security to the incident.<br />

● Sales can work with marketing and security to initiate a takedown of any fake account. Such<br />

accounts are detected by technology that actively crawls the internet (both surface and dark)<br />

around the clock.<br />

● A compliance officer is notified that a message sent by a rep might contain an issue, because<br />

compliance and sales have agreed on what channels need monitoring. The message has been<br />

quarantined so it can be checked before it is allowed to be sent.<br />

The Future of Security is by Design<br />

A Security by Design framework enables enterprises to properly protect themselves, and move from a<br />

reactive stance, where a crisis is always around the corner, to a proactive stance. Security by Design is<br />

the only sensible approach in an era where so many business-critical tools live outside the traditional<br />

perimeter, and modern digital risks are so numerous, complex, and sophisticated.<br />

Security by Design is also the only sensible approach for enterprises that want to do everything they can<br />

do to drive growth. When a Security by Design framework is properly implemented, security becomes a<br />

driver of business success. Executives and board members can view digital security as achieving a<br />

positive goal that helps drive business growth. Security becomes synonymous with revenue. When<br />

properly safeguarding the organization is understood as simple financial prudence, including security at<br />

the inception of a product or service becomes an obvious best practice. This view of security is the future.<br />

About the Author<br />

Jim Zuffoletti has been a founder of start-up organizations as<br />

both an entrepreneur and an intrapreneur for the past twenty-five<br />

years. Jim is CEO and co-founder of SafeGuard <strong>Cyber</strong>, a digital<br />

risk protection company securing brands, VIPs, and team<br />

members in the new world of social media and digital<br />

communications. Jim was previously CEO and President of<br />

OpenQ which enabled pharmaceutical, biotech, and medical<br />

device companies to discover, regulate, and leverage the social<br />

networks forged with outside influencers and researchers. Jim<br />

Zuffoletti can be reached at our company website at<br />

www.safeguardcyber.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2020</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!