Cyber Security

Secure Your Networked World

Threats are NOT under your control; they are “out there”, changing constantly, and requiring special expertise to understand and deal with. On the other hand, your vulnerabilities are under your control, and are likely known to your adversaries, perhaps better than to you.

Our Cyber Security Program is built on two holistic principles - combining technology and the appropriate, proactive procedures. This better enables us to work with you in determining the operational plan and tactical steps necessary to establish a multi-layered cyber protection universe.

Know   Yourself

Risk management is the art of the possible. We will work with you to assess your risks pragmatically.

This discovery process includes:

  • Sensitive Information identification, classification, review and analysis
  • Asset inventory and management review
  • Policy and process review
  • Personnel security review

Know   Your   Enemy

There are five tasks you should execute to better “Know Your Enemy”:

  • Qualitative assessment of existing cyber security posture
  • Technical snapshot: assessing vulnerability of networks & systems
  • Develop “where you should be” (ISO 27000 series)
  • Review personnel security programs (hiring, social media, visitors, etc.)
  • Create a competitive intelligence program

We surround you, your family, your home, your transportation modes and your work environment - worldwide - with holistic, multi-layers of detection, protection and deterrence, so you can be confident in knowing your data is secure.

Lawrence Dietz Cyber SecurityLarry Dietz, TAL Global’s Managing Director of Cyber Security, leads our Cyber Security operations, using in-house and external experts. Other departments, such as Investigations, Emergency Preparedness, and Protection, provide expert support when/where needed.

Latest Updates and News:

August, 2017

Cyber Bullying – It’s Deadly Serious

If anyone doubted the deadly seriousness of cyber bullying, the suicide of 12-year-old Mallory Grossman of Rockaway, New Jersey, on June 14, 2017, should have dispelled those doubts.
April, 2017

A Quick Guide to Digital Security for Business Travelers

A quick guide to digital security during business trips: how to protect your digital assets before, during and after your travel.
February, 2017

Defending Against Business E-mail Compromise (BEC) and Ransomware

Want create site? Find Free WordPress Themes and plugins.Businesses and […]
February, 2017

IoT and SCADA Breaches: Lessons Learned & Case Studies

Lawrence Dietz, TAL Global’s General Counsel and Managing Director of Information Security, TAL Global Corporation, will be the facilitator of a Peer-to-Peer presentation titled "IoT and SCADA Breaches: Lessons Learned & Case Studies", at the RSA Conference at the RSA Conference 2017, February 14, Moscone Center, San Francisco, CA, USA. February 14, 2017 1:15 PM - 2:00 PM.