Governance & Risk Management

Cyber Terrorism: How to Fight Back

Mobile Technology, Social Media Enable New Threats
Cyber terrorism can happen to you, and probably will, says G.F. Bryant Jr. of the World Institute for Security Enhancement.

Supply chain security and consumerization of IT -- especially mobile devices -- are among the top cyber terror threats to organizations of all industries and sizes, Bryant says. And he's particularly concerned about cyber espionage and sabotage.

"Take the threat seriously," says Bryant, who offers five tips for organizations to deter cyber terrorism. "Devote the necessary resources to address the anticipated or perceived threats, and mitigate the risk to reduce the potential [damage] of the threats."

In an exclusive interview on cyber terrorism, Bryant discusses:


  • Current cyber terrorism threats:
  • How the nature of threats has evolved;
  • Ways organizations can best protect themselves.

Bryant serves as the Executive Director of the World Institute for Security Enhancement. He has an international reputation in Risk Management Consulting, Strategic Analysis and Homeland Security training. Mr. Bryant has more than thirty years of combined experience in physical & electronic security and investigation technologies. He has served as a risk analyst to a wide variety of government agencies and corporations around the world, which include many Fortune 500 Companies.

The World Institute for Security Enhancement provides Homeland Security Education and Consultation, for Protection of the Nations Critical Infrastructure, in a wide variety of disciplines to private industry and government agencies.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.