How Cybersecurity Has Changed Lifecycle Management
$65.00
BICSI Members save more. Login or become a Member today.
CECs
1
With emerging threats and regulations being introduced at a frantic pace, mitigating risk is a steadfast process that requires a defined process to protect and secure devices on your network. While it is understood that connected edge devices are at risk to these vulnerabilities, the impact of cybersecurity practices challenges the traditional beliefs of lifecycle management. In this class, Geoffery Bauer presents a modern approach to lifecycle management and discusses overall cyber best practices.
This class was originally presented at the BICSI 2022 Winter Conference.
Course Highlights
Managing firmware and change management for network services | |
The need to take a holistic approach to cybersecurity on the network when it comes to hardware, software, and managing threats through edge devices, cloud, remote access and more | |
The current cybersecurity landscape, current legislation, what type of vulnerabilities an older camera may be at risk for and what the manufacturer’s position is in the larger cybersecurity discussion |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is intended for all ICT professionals, project managers, and commercial premises owners.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection