Why Integrity Is Left Alone and Not Given the TLC It Deserves
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the often-neglected aspect of information security in this thought-provoking conference talk from 44CON. Delve into why integrity, one of the three pillars of CIA (Confidentiality, Integrity, and Availability), is frequently overlooked in organizational security strategies. Examine real-life industry use cases that highlight the critical importance of data integrity in business decision-making processes. Learn about pragmatic options for implementing integrity controls and understand why relying solely on encryption may not be sufficient. Engage in a discussion about the potential consequences of neglecting data accuracy and the impact it can have on various sectors, including payments, online stores, and utilities. Gain insights into conducting impact assessments and prioritizing CIA elements in your security framework. Challenge your understanding of information security and leave with a renewed appreciation for the role of integrity in protecting critical business data.
Syllabus
Introduction
What is Integrity
What do business people understand
Payments
Online Stores
Utilities
Personal Experience
Data Integrity
CIA Priority
No Silver Bullet
Impact Assessment
Encryption
Taught by
44CON Information Security Conference
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera