Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Recorded Webinar

A Cyber Tale: How Failed Security Policies Exposed 40 Million Customers

Date:
Oct. 04, 2018
Duration:
44m

The Target breach exposed the credit card information of 40 million customers and made huge international headlines. But, the entry point should have been the real story. No matter how solid a company’s cyber defense, they have to be concerned with their entire cybersecurity exposure, including supply, partner and support chains. In the Target case, there were errors throughout. It was a breach waiting to happen.

Instructor:
Dave Buster

Dave Buster is an industry veteran with over 35 years of experience in design and product management of technology solutions. Dave spent over 13 years with Cisco systems in product management and technology planning, rising to the level of Director of Product Management in the Global Government Solutions Group. While there, he spent several years supporting federal government agencies with data security architectures. Later, Dave worked in Smart Grid, storage, and financial industries as a Security Architect. Now with Global Knowledge, Dave manages a worldwide portfolio of cybersecurity courses.

Dave has a B.S. in Engineering and an M.B.A. from North Carolina State University. He holds the Security+ and CISSP certifications, and is an amateur radio operator (KK4ELT). He plays trombone and guitar… but not at the same time. Dave also holds a patent on satellite communications architecture.

Dave Buster, Global Senior Portfolio Director for Cybersecurity, will provide a look behind the scenes of the Target breach, including:

  • How it began
  • Attacker escalations and poor network structure
  • Password weaknesses
  • IT staff missteps

 

Buster will also demonstrate how Global Knowledge can help enhance your cybersecurity skills and put you and your team in the best possible position to manage cyberattacks.