Hi [[ session.user.profile.firstName ]]

Information Security Community

  • Date
  • Rating
  • Views
  • We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

    Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

    Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
    -Why they use a layered approach to security and how OpenDNS complements their security stack
    -How long it took to deploy OpenDNS Umbrella globally
    -How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
  • The future for women in Cyber Security is NOW.

    Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.

    At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.

    Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.

    “At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
  • Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.

    Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:

    * Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
    * Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
    * Notifications about breached/exposed credentials.
    * Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
    * Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more.

    Levi Strauss & Co. products are sold in more than 110 countries worldwide through a combination of chain retailers, department stores, online sites, and a global footprint of approximately 2,700 retail stores and shop-in-shops.

    ---

    Harris D. Schwartz is a global security, risk and investigations professional, with over 20 years of private sector experience; experience in the design, development and implementation of comprehensive security, investigations and threat intelligence strategies in a variety of business climates and organization cultures. Schwartz has developed security and risk programs for a variety of business sectors, designing comprehensive threat mitigation solutions, coordination and managing and mentoring of direct reports and multiple departments.
  • Cloud Cybersecurity Lessons From 1B Files and 10M Users

    Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?

    Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.

    Join this webinar to see where your organization stands against your peers and competitors.
  • The second in our Lowering Cyber Risk series with a focus on the Financial Services and helping to meet SOX compliance requirements.

    Cyber Risk is the Risk most underestimated by businesses according to the 2015 Allianz Risk Barometer.

    Learn how organisations are able to lower Cyber Risks associated with Loss Reputation, Business Interruption, and Loss of Customer Data, and thus improving Detection and Response capability.

    Discover how you can help to meet SOX compliance requirements by utilising User Behavioural Analytics, monitoring the user’s access to critical systems with required surveillance, forensics and reporting user access.

    Plus, see a LIVE DEMO with an example of an internal employee attempting to exfiltrate data from critical systems on a Financial Services environment.
  • Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
  • Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.
  • Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.
  • Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
  • Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.

    This presentation provides a clear, simple and useable perspective on big data to include:

    · Big data analytics

    · Where it came from

    · Where it is now

    · Where it’s going

    · Privacy issues

    · Potential data security uses

Embed in website or blog