#ConfidenceCommunity™

AVES CYBER SECURITY  |  Podcast , ±12 min episodes every 5 weeks, 3 days  | 
Hear the latest next-gen insights from the A-Team at AVeS Cyber Security. Every month, we discuss how companies can reduce cyber risks and address digital transformation challenges. Get an inside track for your next-generation businesses to thrive. No IT knowledge required. © AVeS Cyber Security

Subscribe to this channel

You can subscribe to new audio episodes published on this channel. You can follow updates using the channel's RSS feed, or via other audio platforms you may already be using.

RSS Feed

You can use any RSS feed reader to follow updates, even your browser. We recommend using an application dedicated to listening podcasts for the best experience. iOS users can look at Overcast or Castro. Pocket Casts is also very popular and has both iOS and Android versions. Add the above link to the application to follow this podcast channel.

Signup to iono.fm

Sign up for a free iono.fm user account to start building your playlist of podcast channels. You'll be able to build a personalised RSS feed you can follow or listen with our web player.
23
MAR

OT Security Strategy: Key cyber risk management tips for the Mining sector

The Mining sector's key drivers are boosting operational efficiencies and reducing operational risks. In this 6-min episode, our CEO (Charl Ueckermann) discusses how cyber risk management fits strategically into mining companies’ digital transformation roadmaps and address their core business objectives. For more in-depth insight into the topic, read the accompanying article at https://bit.ly/2JIIBJx
15
JAN

Business & IT Strategy: Top six cyber security trends to watch in 2020

The cyber security threat landscape is always shifting, making it easy for businesses to become vulnerable to emerging threats. In this episode, our CEO (Charl Ueckermann) shares his business executives should look out for in 2020. For more details, read the accompanying thought leadership article at http://bit.ly/2GjyPff
16
DEC
2019

Cyber Incident Response: Planning for the unknown cyber threats

When a business is under cyber-attack, it’s easy to play the blame game. Instead, the focus should be on how to recover from the incident as quickly as possible. In this episode, we investigate how companies can render themselves more cyber-resilient, reducing the potential damages cyber-attacks can have on their organisations, and super-boosting their ability to recover from cyber security incidents, quickly. For more details, read the accompanying thought leadership article at http://bit.ly/2M92087
18
NOV
2019

Point of Sale Systems: Securing payment systems in-store and online

Over the festive season, retailers are increasingly coming under attack by cybercriminals as the number of payments processed increase both online and in-store. We look at some of the best practices available to retailers to protect their customers' banking and card information, their e-commerce platforms, and their in-store Point of Sale devices against cybercrime. For more details, read the accompanying thought leadership article at http://bit.ly/2sIjaCL
21
OCT
2019

Consumers’ Information Privacy: Keeping your private information private

In a social media-driven world, we tend to post everything online: who we are, where we are, and what we do at that moment. In this episode, we explore how we can keep our personal information private, away from the prying eyes (and ears) of cybercriminals. We also share a few easy-to-follow tips to outsmart cybercriminals, and not become victims of identity theft or online fraud by taking ownership of what we post online.

For more details, read the accompanying thought leadership article at http://bit.ly/2sPfyyU
23
SEP
2019

Modern Industrial Manufacturing: Protecting PLCs with air-gapped networks

This episode deals with protecting critical infrastructure systems and manufacturing environments from cyber threats. Municipalities and factories both use “operational technology” (OT in short), which is different from IT, which is the day-to-day technology systems that non-manufacturing businesses use. Separating OT from IT is not only a best practice, but also critical in protecting the public’s access to quality water, the country’s electricity grids and even save lives in factories. For more details, read the accompanying thought leadership article at http://bit.ly/2s4sroB
26
AUG
2019

Cloud Security Strategy: Getting it right from the start

We go back to basics in this episode, looking at what the Cloud is, and why this matters in getting your security right in cloud environments. Did you know that cloud security remains your responsibility, not a platform’s? We share a few handy tips on what you can look at to get your company data and apps secure when you choose the Cloud route, starting with Identity & Access Management. For more details, read the accompanying thought leadership article at http://bit.ly/2Q3UZGJ

8 episodes