The dialogue will address the cooperation required to ensure the anticipation, detection, and attribution/identification of critical areas to work on and derive the solution. Defining the perimeters of this dialogue is sensitive and essential to ensure that the dialogue is productive. While on the other hand, it does not make the organization overly reliant on the cooperation of just one perspective, thereby risking compromising the neutrality, impartiality, and independence of the organization. Due to its control over the network on its territory and flows of data going through it, the resources and expertise available, and the international cooperation networks it is likely to be involved in, national organizations/civil entities may have much better means to anticipate, detect, attribute, and respond to cyber operations.
Category: Uncategorized
Cyber Threats
People, not computers, create computer threats. Computer predators victimize others for their own gain. Give a predator access to the Internet — and to your PC — and the threat they pose to your security increases exponentially. Be Vigilant.
Africa Cyber Defense Forum 2020
Cyber Security,Fraud and operation risk; The time for coverage is now.We are looking forward to participating at the Africa Cyber Defense Forum. Register now for free at https://africacyberdefenseforum.clickmeeting.com/the-africa-cyber-d-efense-forum-2020/register
Social Media Pitfalls
Whatever platform you’ve made your online home on, one thing is certain: plenty of people take social media safety less seriously than they should. They post, share, and retweet without considering their privacy.
Current Employee Background Check
Employee fraud is common phenomena in most organizations. Majority of employers usually ignore the basis of conducting thorougher continuous due diligence on current employees and the newly contracted thus ending up incurring huge loses. Here is what you should know and consider.
Security Fraud
Fraud Manifests itself in may different forms. Here is what you need to know about Security Fraud.
5G Network And Cyber Security
Speed is important, but speed without a good targeting solution can be disastrous.- Admiral Arleigh Burke in World War II
The 8 wastes of lean
Lean is an approach that seeks to streamline both manufacturing and transactional processes by eliminating waste and optimizing flow while continuing to deliver value to customers.Here are the 8 lean wastes that you should know.
Employee Background Screening
Do you have an idea on how to conduct background-checks on your employees before hiring them? A good corporate should always conduct an employment screening process by doing a comprehensive background check on each and every applicant without being bias.
Internal auditor’s role in fighting fraud
According to the international standard on auditing (ISA) 240, the auditor’s responsibility relating to fraud requires the auditor to maintain an attitude of professional skepticism, notwithstanding the auditors past experiences about honesty and integrity of management and those charged with governance.