Welcome back, everybody, to New Cyber Frontier. In today’s Episode we have guest Eslam Tawfik Ph.D. .Dr Tawfik. studied advanced technology in Egypt. Cybersecurity is frequently used to describe the defense of digital networks, systems, and data against harm, unwanted access, and attacks. On the other hand, protecting the hardware and infrastructure that underpin digital systems is referred to as the physical part of cybersecurity. Securing the Root of Trust is a term you will hear throughout the talk, this is what Dr. Tawfik, explains as the set of underlying credentials that the security in each device depends upon. Cyber Physical security as you will hear also includes defending against different attacks to hardware devices, server rooms, data centers, and network connections, among other physical assets. Organizations can establish a more comprehensive security posture to safeguard their digital assets and infrastructure from various threats by incorporating physical security considerations with traditional cybersecurity procedures. Listen to this fascinating episode where our guest provides some insight that will resonate with many of you interested in the security of IoT and Critical Infrastructure systems.
Visit our sponsors:
BlockFrame Inc.
NCF-SR10 History of Communications Security Part I
NCF-71 Operational Cyber Security for your Business
NCF-70 Cyber Security Managed Services the New trend with Guest from Istonish
NCF- 69 Cyber Security for Business and Financial Management
NCF-68 Hispanic Community Leaders in CyberSecurity
NCF-67 The basics on Patents, Trademarks, and copyrights with the USPTO
NCF-66 Building Excitement in The future of Cyber Security with Circadence
NCF-65 Securing Oil & Gas Infrastructure with BHGE
NFC-64 (GDPR) European Union Changes the Game For Privacy
NCF-63 FedRAMP Demystified With Coalfire's Cyber Risk Director
NCF-62 SecureSet, Cyber workforce development, and an Introduction to Our New Host
NCF-61 Cyber Security for Ships on the Ocean with CIMSEC
NCF-60 Security Information and Event Monitoring 101
NCF-59 Things to do - Before Calling that High Priced Penetration Tester
NCF-58 Apozy Anti-Phishing & Anti Malware
NCF-57 Business Application Firewalls the Next Generation of Data Analytics
NCF-56 Security and Privacy for Our Medical Records
NCF-SR9 Legislator Focuses on Using BlockChain for Cutting Edge Governance Programs
NCF-55 Penetration Testing Hear from the NSA Certified Experts at Plex
NCF- CO7 Exploring Cyber Security Across the Community - DOD Office of Economic Adjustment Project
Create your
podcast in
minutes
It is Free
Get Creative with Pace Morby
The Everyday Millionaire
Pure Hustle Podcast
The Ramsey Show
The Diary Of A CEO with Steven Bartlett