How to assess cyber health and risks: Users and Data

How to assess cyber health and risks: Users and Data

31may3:00 pm4:30 pmHow to assess cyber health and risks: Users and DataSASIG Academy Cyber Health Session 4

Secrutiny Cybersecurity

Event Details

SASIG Academy Cyber Health Session 4

Hackers gain access to systems by exploiting a series of vulnerabilities in their escalation to achieving data theft or destruction. A concept widely known as the ‘kill chain’, it is best represented by a pyramid where the available surface area (or systems) that are exploited at each level narrows on their approach to targeted services, network(s), user rights and behaviours, and ultimately – data. Although there is a greater risk of exploitation at the lower tiers, it is spread out. Yet at higher levels, it is more focused – and has more impact that leads to damage.

This paradigm of cyber risk provides a context for assessing the health of an organisation’s cybersecurity.

Our final session focuses on identifying common cyber risks from the uppermost layers, ‘users’ and ‘data’, and provides an overview of the methods for assessing cyber heath. It will include scripts, demonstrations, and data analysis techniques – as well as references useful for collating information.

Register now with our partners Security Awareness Special Interest Group (the SASIG).

You can also register for the other sessions in the training series here:

Register here



(Monday) 3:00 pm - 4:30 pm

Go to Top