View allAll Photos Tagged CyberSecurity2018

"Whatever obstacles I run into exploiting your technical vulnerabilities will be made up for by exploiting the vulnerabilities in the cyber hygiene of your staff" - James Scott, Senior fellow, ICIT

#InformationManagement #Cyberhygiene #CyberSecurity2018 #InformationSecurity #CIO

"The iot threat landscape can be secured by focusing on security during the development lifecycle." - James Scott, Senior Fellow, ICIT and CCIOS

#IOT #InternetOfThings #Manufacturing #DeviceSecurity #Security #cybersecurity2018