How to do VIP and executive protection with CIH Cyber Exposure Platform

cyber-exposure-platform-investigation module

Threats arising from cyberspace pose risks to both VIP individuals and the companies they associate with. Executive and VIP protection has traditionally been associated with physical security, but today, criminals target VIPs to gain access to high-value assets, to impersonate them in phishing campaigns (spear phishing attacks) or use their names and data in other fraudulent activities.

Know the Current Liabilities

current liabilities

Before the cloud, everyone had his or her own little medieval IT castle—the data centre. Much like a real castle, it had a perimeter wall (network edge), a gate with guards who allowed or blocked access (firewall) and different defence zones within the walls (network segments). It was pretty simple to identify liabilities—they came from the guys trying to ram in the castle door.