Blog

Cybercriminality: From rule-based to anomaly detection

Sandro Sinigaglia, Topic leader & lecturer, Executive Master in Information Security Management 30/11/2017 IT

Watch our video and find out how to protect your assets against cyber-attacks using 3 key steps!

To protect our businesses, we need to know very well our landscape and apply the best practices and strategies in our fight against hackers, cybercriminals and even nation states who might use our information to their own advantage:

  1. Prevent: prepare in advance a defense model
  2. Detect: identify what you could omit or not handle very well
  3. Respond: act in case of the attack.

If you have an interest in such hot topic and aspire to become more knowledgeable in the management of information security, do not hesitate to consult our website for the next intake of our programme.

Plus d'info sur le programme : Information Security Management Education

Retour à la liste des articles