exist within your
Today, the reality is that every individual, business and government is connected to the Internet. As such, everybody is vulnerable to cyberattacks, and as types and sophistication of these attacks continue to grow, it becomes increasingly obvious that not all of them will be understood and responded to quickly.
Any attack, however, requires a vulnerability - a weakness in your people, systems, or processes - to succeed. Identifying such weaknesses before threat actors do and remediating them in a timely fashion is one of the key elements of an effective cybersecurity program.
Your Subject Matter Expert
An experienced management and cyber risk consultant with a demonstrated history of success in the non-profit and financial services industries. A skilled systems auditor, enterprise integration architect, DevOps lead and penetration tester, Jana holds a distinguished degree from York University.