Free Short Course: Cyber Defence Strategies - Module 1

Cyber-attacks and data breaches are more prevalent than ever before. Even over the last year, several high-profile data breaches have occurred. With ever-evolving threat actors and tightening regulations, a good cyber defence strategy is crucial to helping prevent and minimising the risk and impact of a cyber-attack.
Sign up here: itmasters.edu.au/free-short-c...

Пікірлер: 5

  • @erangaindrajith5403
    @erangaindrajith5403 Жыл бұрын

    Thanks for this. I was joined lately but got opportunity to catch up using this upload .

  • @MAKIAVELOMANAGEMENT
    @MAKIAVELOMANAGEMENT Жыл бұрын

    🤓 Great webinar !!! Mr. Georg Thomas, great proffessional.

  • @obasiazubuike3081
    @obasiazubuike308110 ай бұрын

    Thanks for this information

  • @cyberifynkems
    @cyberifynkems7 ай бұрын

    Phishing attack, Insider threat

  • @BMcEvoy
    @BMcEvoy9 ай бұрын

    The dwell times chart - it looks like the "All" figure is a combination of the other two, but what you're seeing is an average in every case, which obscures the count of the number of cases. So for example in 2017, the average dwell time for a breach which was reported externally was 1088 and for internally reported was 320.5. The fact that the average of "all" is 498 means there are far fewer external reports than internal ones (the average is closer to the internal figure). You can imagine if there was 1 external and 10 internal reports then the "all" average would be (1088+3205)/11 = 390.27. So the position of the "all" figure between the other two just gives an indication of how heavily weight the number of reports was for each category. (For 2017 the ratio is about 3:10 external:internal)