twitter_chat

Updated 6:02 pm E.S.T. We hosted yet another lively and informative discussion on one of the hottest trending topics: corporate data breaches. Our guest experts and participants brought the conversation to a new level with incredible insights demonstrating their authority on the matter. Data breaches: are they inevitable for every company? If you think so, scroll down to get a glimpse at the kinds of advice our experts give in the face of a breach, and how to prevent another one. Make sure to join in our upcoming Twitter chat on June 25, 12-1 pm E.S.T! 

After hearing about some major retail brands that have lost customers’ credit card data to hackers, the reality of how commonplace data breaches really are is hitting home not only for IT administrators, but the average person. Our discussions looks at not only how to prevent a data breach from ever occurring, but what to do when it does happen to mitigate the harm to your organization. After all, as most security experts will tell you, it’s not a matter of if you suffer a data breach – it’s when.

Have you been impacted by a data breach or have an opinion on it? Join us on May 28, 12-1 PM EST to discuss the prevention of and response to data breaches, at the hashtag #ITWCchats. We’ll be joined by the following guest experts:

Claudiu Popa, Security expert
Claudiu Popa
Claudiu Popa is a security and privacy advisor to Canadian enterprises, associations and agencies. He is an author, speaker and lecturer. Follow Claudiu @datarisk.

Mike Ball, security expert
Michael Ball
Mike Ball has survived various roles in the IT field for the past 25+ years from Hardware developer with the National Research Council, through Network Administrator, and teaching Computer Science, to Network Architect and CISO of a prominent Insurance company. Follow Mike @Unix_Guru.

If this is your first time taking part in a Twitter chat, check out this video on how to join a twitter chat.

Check out the questions below for a sneak peak on what to expect in the chat:

Q1 What kinds of cyber security attacks are most common on an organizational level? What big data breach examples come to mind? #ITWCchats

Q2 What kinds of preventative techniques and tools will be the best at safeguarding company data? What are the pros and cons? #ITWCchats

Q3 How can companies improve the processes followed by employees to avoid data leaks? #ITWCchats

Q4 In face of a data breach, what is the appropriate first response? #ITWCchats

Q5 What security considerations are important to keep in mind as you continue to build applications and services? #ITWCchats


Q6 With increased pressure to discover breaches and launch a timely response, how do you improve monitoring for breaches? #ITWCchats

Q7 What are your thoughts on the Digital Privacy Act? Does it cover all the concerns related to corporate cyber security breaches? #ITWCchats

Q8 How should companies communicate to their customers that their information will continue to remain private after a breach? #ITWCchats

Q9 What effect will additional layers of security and changing practices have on end users in companies? #ITWCchats

Q10 How does the rise of unstructured, big data affect corporate security practices? #ITWCchats



Related Download
Gartner Magic Quadrant for Web Content Management 2015 Sponsor: Acquia
Gartner Magic Quadrant for Web Content Management 2015
Download this Magic Quadrant report to learn more about the WCM market and help evaluate vendors based on your specific needs
Register Now