In a context in which a real cyber-arms race is in place, there is a clear need for a global framework for the use of cybernetics.
The definition of computer security must, first and foremost, must include availability and integrity of data and confidentiality, as well as information, and permissions.
Cybersecurity is a mantra, a term that has slowly caught on, and its meaning is to deal with an issue that has always existed, the Information Security (InfoSec).
Information Technology Director, Cybersecurity Officer (CISO), and Certified Information Systems Auditor (CISA) cyber security risk management, John Giordani
How the WannaCry's computer attack spread so easily on a global scale, affecting hundreds of systems in 105 countries?
John Giordani Information Technology and cyber security risk management
Digital devices and IT are at the center of both our day-to-day work and leisure activities. Information affects many aspects: think of communication, the details of our lives that we share on social networks, and internet searches.
All this forms a unique and detailed package that takes the name of a digital identity. For example, messages that are exchanged every day on some systems do not reside locally on the device but are saved in such a way as to be readable, for example, by the PC. It's cloud technology that saves data on a server and then shows them on demand. Another use of the cloud is to save your files to a non-physical storage to have a copy available from any internet browser. This prevents the loss of data that may result from damage to a hard drive or theft. There are cases of so-called passive security, that section of computer security that cares about unwanted unexpected events. This fascinating branch has a whole set of practices that for example keep servers in an armored, supervised room, in the case of companies handling sensitive databases. Or the proper maintenance of the machines used to handle this data.
What derives from using cloud systems is the need to be careful about the passwords set up and use, and applies to all the services you subscribed to. Social networks, email providers or others. It is advisable to use different access keys for different services and change them frequently, for precaution. John Giordani information technology cyber security risk management
I have 20 years experience directing and consulting on information technology risk, cyber security risk management andsecure system implementation & operation, developing & executing global security strategies for organizations, as well as, assessment and control. I have been responsible for developing security/privacy strategies, directing the execution of client projects and ensuring the on-time delivery of solutions. Currently CISO and IT Director of NCHENG LLP. John Giordani
A mature strategy of cybersecurity is a four-step process that goes from "doorman" to "special forces". Taking the initiative to address the global security challenge is essential.
Is it true that artificial intelligence and machine learning are the future of cybersecurity?John Giordani Information Technology and cyber security risk management
Cybersecurity, ongoing work for global security rules