Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy.
The Global Risks 2017 report, published by the World Economic Forum (WEF), included this rather stark warning: “90 percent of companies worldwide recognize they are insufficiently prepared to protect themselves against cyber attacks”.
For Episode 9 of our Emerging Technology Video Series, and as the instructor for our upcoming Cyber Security, Strategy for preventing, detecting and responding to threats course, we asked Tony Vizza some of the burning questions we had about this undeniably necessary industry.
Tony is a seasoned information technology professional who discovered a passion and aptitude for IT since childhood and has never looked back. Tony is currently building Australia’s leading managed information security and information management practice and consultancy at Sententia.
In this episode, we ask Tony how he got started in the cyber security industry, what the biggest cyber security risks to everyday businesses are, his opinion on the future of cyber security, and more!
Watch the full episode below.
If you are interested in learning about cybersecurity for you or your employer join our Cyber Security, Strategy for preventing, detecting and responding to threats course, where students will learn from information security and management consultant at Sententia, Tony Vizza.
This Masterly AI course is for open, ambitious and curious learners looking to stay relevant.
It’s for employees, managers, leaders, freelancers, entrepreneurs, and anyone in between.
In our upcoming 4- part time Cyber Security course you will learn:
- A fundamental understanding of what Cyber Security is and how it’s effecting every business in today’s digital world
- An understanding of who the hackers are and what motivates them
- How to plan ahead and prevent cyber attacks
- How to detect a breach in your organization
- How to react and respond to a cyber attack from a legal, technical, internal and public perspective