Need more options? Click Here for Advanced Search!

Cyberwarfare: Security Threat Prevention and Breach Response Protocols to Minimize the Risk of Catastrophic Business Disruptions

Cyberwarfare: Security Threat Prevention and Breach Response Protocols to Minimize the Risk of Catastrophic Business Disruptions

Product Code: YEWB022420A

* Required Fields

Availability: In stock

Internet Special:
$249.00
Add Items to Cart

Cyberwarfare: Security Threat Prevention and Breach Response Protocols to Minimize the Risk of Catastrophic Business Disruptions

Live Webinar: Monday, February 24, 2020

1:30 p.m. to 3:00 p.m. Eastern / 10:30 a.m. to 12:00 p.m. Pacific


WEBINAR SNAPSHOT: Learn how to manage the potentially imminent threat of cybersecurity attacks with actionable ways HR and IT can work together to minimize the threat cyberattacks pose to business operations, computer systems, and data.



Current tensions with Iran have raised the cybersecurity threat level against the U.S. government and civilian targets, and serve as a sobering reminder of the full range of possible attacks a company may face.

It’s been over five years since the last publicized Iranian-attributed attack on an American target when the computer systems at the Sands Las Vegas were infected, NBC News reported. But, given the recent escalation of military action in the Middle East, a new round of attacks could be forthcoming—from “wiper” malware that literally deletes systems, to ransomware infiltration, where attackers demand payment in exchange for unlocking access to organizational data, to phishing schemes to obtain sensitive and potentially confidential data.

Time is of the essence to ensure that companies have systems and checks in place to thwart potentially devastating cyberattacks on their computer systems—by hostile nations as well as criminal networks, disgruntled employees, and other sources.

Join us on February 24 for an all-new webinar with Digital Silence COO and co-founder Dan Nelson, a certified ethical hacker, for the latest on what how HR and IT can work together to minimize the threat cyberattacks pose to your business operations, computer systems, and data.

After attending this webinar, you’ll be able to: 

  • Recognize the types of cybersecurity threats that now could be launched against U.S. companies 
  • Evaluate whether your current cybersecurity policies and procedures are likely to ward off such threats—and what you should immediately do if you determine they’re too weak
  • Communicate and promote best practices among the workforce to minimize the potentially devastating effects of wiper and ransomware attacks as well as phishing schemes
  • Avoid the top 5 things employers—or their employees—could be doing right now that’s putting them at particularly high risk of a cybersecurity attack
  • Take appropriate action in the event of a cyberattack on your organization to minimize its effects

About Your Presenter

Daniel Nelson, Esq., C|EH, CIPP/USDaniel Nelson, Esq., C|EH, CIPP/US
Co-Founder & COO
Digital Silence, Ltd.





Ryan Jones

Chief Technology Officer
Digital Silence, Ltd.

Dan Nelson is both a lawyer and a security professional.  He holds the Certified Ethical Hacker (C|EH) certification, and is also a Certified Information Privacy Professional.  His company, Digital Silence, provides both “offensive” security assessments—people hire them to break into software, systems, and facilities—as well as Incident Response forensics and Fractional CISO/Security Engineer services.

Prior to co-founding Digital Silence, Nelson spent over 25 years as a partner at an AmLaw 200 law firm, where he co-founded and led the Firm’s Privacy and Data Security Practice.  Among other services, he provided breach counseling to clients on over 200 suspected security breaches, as well as guidance and assessment work on a variety of security and privacy topics, including GDPR, CCPA, and HIPAA. He was also a multi-year selection to Best Lawyers in America® for both Commercial Litigation and Privacy Law.

Ryan Jones leads Digital Silence’s Fractional Services practice and serves as a virtual Chief Information Security Officer for a variety of companies.  His 25-plus years of experience in the security industry include stints at IBM, Cisco, Trustwave, and other well-known tech companies.