Monday, 6 January 2020

What is in your event cybersecurity strategy


Open source intelligence is an area that is often overlooked and widely misunderstood. It is also known as OSINT as part of the overall event cybersecurity strategy.

 You need to target your own organization to find loop holes and see where or how you could be attacked. You are able to identify the information leaking out of your vendor’s connections to your data or through your own technology before they get to you 1st.

Image result for cybersecurity strategy

Digitally, you can use OSINT tools to identify everything you can about the technology and people that work at your organization as well as use it to see if your sensitive data has leaked online. Trust me, if its digital it is worth taking as many assets are valuable. But here are the top 3.

Finding the schedules of notable people and their security details assignments

Being able to spoof or fake credentials online or in a person.

Stealing personally identifiable information. PII.

Cybercriminals are just like bank robbers in the old days the follow the money. That is why in this day and age, if you are running a large public event that draws thousands of people, whether it be at the state, national or local level, you need to be as vigilant about protecting data as any business. Otherwise, you will lose your customers.

Image result for cybersecurity strategy

So, whose job is it to check if it’s safe? You are defiantly not going to like the answer. It’s your job to protect the traffic and its contents as confidential and sensitive. It is also your job to have a security plan that is both digital and physical. Fundamentally, you cannot assume that safety is someone else’s job. 

You can always check in with us on 0211100422 or www.tcgforensics.co.za 

No comments:

Post a Comment