Cyber Security

Secure Your Networked World

Threats are NOT under your control; they are “out there”, changing constantly, and requiring special expertise to understand and deal with. On the other hand, your vulnerabilities are under your control, and are likely known to your adversaries, perhaps better than to you.

Our Cyber Security Program is built on two holistic principles - combining technology and the appropriate, proactive procedures. This better enables us to work with you in determining the operational plan and tactical steps necessary to establish a multi-layered cyber protection universe.

Know   Yourself

Risk management is the art of the possible. We will work with you to assess your risks pragmatically.

This discovery process includes:

  • Sensitive Information identification, classification, review and analysis
  • Asset inventory and management review
  • Policy and process review
  • Personnel security review

Know   Your   Enemy

There are five tasks you should execute to better “Know Your Enemy”:

  • Qualitative assessment of existing cyber security posture
  • Technical snapshot: assessing vulnerability of networks & systems
  • Develop “where you should be” (ISO 27000 series)
  • Review personnel security programs (hiring, social media, visitors, etc.)
  • Create a competitive intelligence program

We surround you, your family, your home, your transportation modes and your work environment - worldwide - with holistic, multi-layers of detection, protection and deterrence, so you can be confident in knowing your data is secure.

Lawrence Dietz Cyber SecurityLarry Dietz, TAL Global’s Managing Director of Cyber Security, leads our Cyber Security operations, using in-house and external experts. Other departments, such as Investigations, Emergency Preparedness, and Protection, provide expert support when/where needed.

Latest Updates and News:

February, 2017

Defending Against Business E-mail Compromise (BEC) and Ransomware

Want create site? Find Free WordPress Themes and plugins.Businesses and […]
February, 2017

IoT and SCADA Breaches: Lessons Learned & Case Studies

Lawrence Dietz, TAL Global’s General Counsel and Managing Director of Information Security, TAL Global Corporation, will be the facilitator of a Peer-to-Peer presentation titled "IoT and SCADA Breaches: Lessons Learned & Case Studies", at the RSA Conference at the RSA Conference 2017, February 14, Moscone Center, San Francisco, CA, USA. February 14, 2017 1:15 PM - 2:00 PM.
January, 2017

Fraud Alert! Film Industry Professionals

A fraud scam is being perpetrated on film industry professionals by a group of fraudsters, posing as Huaxia Film Distribution, a legitimate company.
November, 2016

The Recent Massive Internet Attack: What does it mean to you and what should you do about it?

The attack was executed by a botnet, called Mirai which is a collection of ‘captive’ devices, such as webcams and baby monitors. The botnet generated by tens of millions of IP addresses overloaded the system resulting in the massive outage.