Dr. Jayshree Pandya, Founder of Cyber-Security and Strategic Security Risk Research Centers @ Risk Group discusses " Growing Risks of Network Security" with Amrit Williams DePaulo, Chief Technology Officer @ Cloud Passage. Introduction Network security threats are a growing problem! As the security threats facing computer networks are becoming more sophisticated technologically and getting harder to detect, the consequences of failing to manage the cyber-security risks or block cyber-attacks are getting big and increasing rapidly. Each nation: its governments, industries, organizations, academia and individuals (NGIOA-I) not only have to pay careful attention to the threats facing their computers and networks, but also be proactive in understanding the risks their computer network brings. In addition, it is important to keep an eye on the emerging technology innovations that would add complexity to the already complex cyber-security risks and already vulnerable digital cyber-networks. Entities of all sizes across NGIOA are suffering consequences from network security breaches, and if 2016 is any indication, the risk of security breach is getting complex, growing and changing rapidly. So What Defines an Attack On a Computer Network? A network attack is usually defined by the industry as an intrusion on the computer network infrastructure that will help analyze the computer network environment and collect information in order to exploit the existing open vulnerable ports or vulnerabilities. From social engineering to phishing attack to social phishing and spear phishing attack each and every entity across nations is vulnerable to these attacks on computer networks How can any individual or an entity identify vulnerabilities and risks on their computer network? So when there are vulnerable weak spots in a network that might be exploited by a security threat, how can individuals or entities protect against spear phishing and advanced targeted attacks? It is important to evaluate this and other key questions to identify, understand, evaluate and manage network security risks: What is network security? How does network security work? Do individuals or entity has sufficient network security? What are the security threats to any network-individual or any entity across NGIOA? What are the benefits of network security as seen for any Individual /or any entity across NGIOA? How does network security start? How do we secure networks? How should any entity approach network security? It is said that no network is safe without the proper security solution in place. As network security has evolved from protecting an individual network with a firewall to include more visibility and control of the network, the question remains whether there are effective solutions available for network security. It is also important to evaluate whether Entities across NGIOA develop the policies in collaboration with insurance companies Entities across NGIOA develop the policies in collaboration with social media companies like Facebook / LinkedIn and so on What process should entities perform for educating the employees for their network security The topics discussed in this Dialogue: Computer Network: Attack Computer Network: Vulnerabilities and Risks Computer Network: Security Computer Network Security: Approach and Process Computer Network Security: Gaps and Challenges Computer Network Security: Questions from LinkedIn Network For more, please watch the video or hear the audio podcast. Risk Roundup: video/audio podcasts are available on YouTube, iTunes, Android, Stitcher Radio, Risk Group website, professional social media and Risk Group networks. About Risk Group: We @ Risk Group believe that risk management, security and peace walk together hand in hand. Though security is related to management of threats and peace to the management of conflict,