The following topics were discussed:
- How to value your Information Assets – A paradigm shift from Information Security to Information Risk Management;
- Policies, procedures and tools to successfully implement Password Management;
- Identity Management; and
- A Vulnerability demo taken from the Certified Ethical Hacking course
An interesting question came up during the session : "can one say that there is such a thing as ethical hacking; the law does not differentiate between hacking (malicious intend) and ethical hacking..." - What do you think...
No comments:
Post a Comment