TechTalk Cyber Security


 

VIEW AWARDS RECORDING

The Los Angeles Business Journal recently assembled a panel of industry experts to discuss how businesses can protect their computer systems, networks and data from theft or damage; improve loss prevention protocols; and improve business tech-related processes overall. As we all rely more and more heavily on technology, the importance of protecting data, information, and communication has never been more important.

From common management mistakes and changes to the regulatory and legal landscape; from the impact work from home has had on cybersecurity to best practices in managing the latest tech, the panelists stepped up to help our audience get informed.


PANELISTS

 

Jeromie Jackson
Director of Security & Analytics
Nth Generation Computing, Inc.

“As cybersecurity threats and attacks continue to skyrocket, both in volume and complexity, a holistic approach to strengthening your security posture has become a must!”


 

David Lam, CISSP, CPP
Partner/CISO
Miller Kaplan

“Information security best practices and the law agree that responsibility starts with leadership and requires subject matter expertise. The unwarranted belief that IT is managing information security can be very expensive.”


 

Dr. Clifford Neuman
Director, USC Center for Computer Systems Security Associate Professor of Computer Science Practice
USC Viterbi School of Engineering

“We need to break the patch and attack cycle. Systems should be designed for fundamental resilience against new attacks, rather than responding to each newly discovered vulnerability.”


 

Timothy K. Smit
Global Privacy & Cyber Risk Consulting Leader, Vice President
Lockton Companies

“Every organization’s critical processes and core services are anchored in technology: email, accounts payable, accounts receivable, contracts and procurement. Those data paths must be scrutinized and protected to be resilient from cyber attacks.”


Timothy J. Toohey
Chair & Partner, Cybersecurity & Privacy Group
Greenberg Glusker LLP

“When we approach cyber security today, it is important to consider the increasing number of state laws that require businesses to have ‘reasonable security’ in place. A business must carefully assess the personal information that it collects and evolving threats from hackers and bad actors in establishing its security practices. There is no ‘one size fits all’ for security.”


Inside This Supplement

CCPA: The Other Problem with a Capital “C”
With the all-encompassing distraction of keeping up with the evolving COVID-related guidance, ordinances, and regulations, many employers have forgotten the other looming problem with a capital “C” – California Consumer Privacy Act (CCPA)… Read More

Home Office Cybersecurity Best Practices
Due to the COVID-19 pandemic, many who typically work in an office have found themselves performing work duties in their homes. This can be a potentially dangerous situation in terms of cybersecurity and data protection… Read More

Leading from the Top: Information Security Governance
Most of the business leaders and executives that I talk to frame information security as a problem for IT to manage and solve; however, IT cannot and should not manage or solve this problem on their own… Read More

Cybersecurity, Communication Lead 2021 Top Five Technology Trends
Pandemic also advances collaboration, edge-computing, and outsourced IT departments
Information technology (IT) underwent a major change in 2020 as organizations were forced to quickly adopt strategies to handle new cybersecurity threats and increased… Read More

Alarming Cybersecurity Threats and Remediation Trends in 2021 and Beyond
In a climate where cybercrime is increasing exponentially, the risk of organizations being disrupted is imminent. Did you know that in 2020, there was approximately one ransomware attack every 10 seconds and Malware increased by 358%… Read More

Experts Record Increase in Number of Attacks on Trade Enterprises
Report shows that the number of attacks on the trade industry increased by 56% in Q4 compared to Q3 and is the highest level seen in the past two years
Analyzing the cyber threats of Q4 2020, Positive Technologies specialists have revealed an increase in the number of attacks aimed… Read More

California Broadens Data Privacy Protections
On Nov. 3, 2020, California voters approved the California Privacy Rights Act (CPRA) expanding and modifying privacy rights under the California Consumer Privacy Act (CCPA), which went into effect on Jan. 1, 2020… Read More


 

Sponsors

 


If you’re interested in sponsoring, speaking or partnership opportunities please call (323) 549-5225 or email us.


To return to main page click here