Cyber Security

Secure Your Networked World

Threats are NOT under your control; they are “out there”, changing constantly, and requiring special expertise to understand and deal with. On the other hand, your vulnerabilities are under your control, and are likely known to your adversaries, perhaps better than to you.

Our Cyber Security Program is built on two holistic principles - combining technology and the appropriate, proactive procedures. This better enables us to work with you in determining the operational plan and tactical steps necessary to establish a multi-layered cyber protection universe.

Know   Yourself

Risk management is the art of the possible. We will work with you to assess your risks pragmatically.

This discovery process includes:

  • Sensitive Information identification, classification, review and analysis
  • Asset inventory and management review
  • Policy and process review
  • Personnel security review

Know   Your   Enemy

There are five tasks you should execute to better “Know Your Enemy”:

  • Qualitative assessment of existing cyber security posture
  • Technical snapshot: assessing vulnerability of networks & systems
  • Develop “where you should be” (ISO 27000 series)
  • Review personnel security programs (hiring, social media, visitors, etc.)
  • Create a competitive intelligence program

We surround you, your family, your home, your transportation modes and your work environment - worldwide - with holistic, multi-layers of detection, protection and deterrence, so you can be confident in knowing your data is secure.

Lawrence Dietz Cyber SecurityLarry Dietz, TAL Global’s Managing Director of Cyber Security, leads our Cyber Security operations, using in-house and external experts. Other departments, such as Investigations, Emergency Preparedness, and Protection, provide expert support when/where needed.

Latest Updates and News:

November, 2016

The Recent Massive Internet Attack: What does it mean to you and what should you do about it?

The attack was executed by a botnet, called Mirai which is a collection of ‘captive’ devices, such as webcams and baby monitors. The botnet generated by tens of millions of IP addresses overloaded the system resulting in the massive outage.
June, 2016

What Does Gartner, Inc. Think about Cyber Security, and Why Should It Matter To You?

Gideon Gartner, a former financial analyst of the Gartner, Inc. revealed its “Top Security Predictions 2016”
March, 2016

Apple, The FBI and You

Recently, the US Federal government (in this case represented by the FBI) asked Apple Corporation to help them ‘crack’ the password of one of the iPhones used by a shooter in the December 2015 attack in San Bernadino attack where 14 people were killed and another 21 injured. Lawrence Dietz, Esq, TAL Global's General Counsel and Managing Director, Information Security, examines the background, reasons and ramifications of the recent clash between the two powerful organizations.
October, 2015

Safe Harbor: The TAL Global Perspective

The European Union Court of Justice issued a judgment on October 6, 2015 which declared the Safe Harbor Framework as invalid. While the long term effects of this ruling are far from clear, organizations that are doing business within the EU and those that are storing data about EU citizens and organizations need to be proactive to minimize the likelihood of problems with their international operations.