Hi {{ session.user.profile.firstName }}

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • We caught up with Pen Test Partner's Ken Munro, to get his Top 5 reasons that you should be scared of your customers.
  • The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many of these risks being realised; examples have included major breaches of security and costs to recover escalating into millions of dollars, as a result of the third party supplier being comprised. Changes in regulation, the evolving threat landscape and policy changes globally further complicate matters, generating further risk and expense for business.

    Despite considerable efforts from many industries to address these issues, it remains difficult to manage. As well as the risks described, companies perceived as the ‘weakest link’ in the supply chain could end up not having third party contracts renewed. These challenges are discussed in more detail, and some suggestions put forward to help tackle the increasing burden on teams and risk mitigation strategies.
  • How can companies effectively measure their company’s risk of a data breach? What security metrics are most important when it comes to determining breach risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile? Can you aggregate data to create high-level ratings to measure and report on cybersecurity risk?

    Join BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs to get these questions answered - and more. This data driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
  • A recent Forrester Consulting survey revealed that while organizations initially rated all Next Generation Firewall features as high priority during evaluation, only two features were actually used in more than 50% of deployments. Respondents cited configuration challenges, too much noise and slowdown in performance as the primary reasons for using fewer features. In this webcast we will discuss how to get full value out of a next generation firewall:
    · Finding an effective, accurate and extensible set of NGFW security features
    · Defining, configuring and validating an appropriate set of NGFW policies
    · Assessing actual performance of NGFWs
    · Monitoring NGFWs on a regular basis
    · Responding to the inevitable incident with your NGFW
  • You're invited to join us on Thursday, Nov. 19, to be among the first to see how ThreatSecure Network, which detects advanced threats and network anomalous behavior, is integrating with Splunk to make powerful big data capabilities a reality for your security team.

    The webinar will demonstrate how this integration will enable teams to:

    · Decrease the time of incident detection and reporting
    · Analyze data and make informed decisions on threat severity via a single interface
    · Demonstrate and determine the impact of malware across the network
  • It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.

    Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.

    In this webinar you’ll learn how to:

    -Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts

    -Implement controls on OSS usage at your organization

    -Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
  • The holiday season is approaching and for cyber criminals, this period is typically a feeding frenzy to hunt and exploit vulnerable businesses and employees. The statistics are staggering:

    – 64% of organizations report an increase in cyber-crime on cyber Monday*
    – 30 million malicious tweets are sent daily*
    – Phishing links skyrocket by around 336% during Thanksgiving**
    – Organizations get hit with losses of about $500k per hour when compromised***

    The overall cost to an organization, including damages to reputation and brand, can be as high as $3.4M per hour. And yet, only 70% of companies take extra precautions in anticipation of these higher risks.*** How confident are you that your employees will not be used as a Trojan horse to compromise more sensitive company information?

    Join Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc., for a compelling webcast that will address:

    – 5 key ways cyber criminals will target your employees and infiltrate your organization
    – Key insights into holiday activity from Zscaler’s Security-as-Service platform
    – Tell-tale signs that you have been compromised
    – Guidelines and best practices to stay safe this holiday period

    *Inc. - How Hackers Will Attack on Cyber Monday
    **Huffington Post Tech - Five Ways You'll Be Hacked on Cyber Monday
    ***Computer Business Review - Cyber Monday attacks could cost organizations up to $3.4m per hour
  • We know that “What happens in Vegas, stays in Vegas” is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network? If you’re thinking VPN? Think again. Why would employees VPN when they’re working in Office 365 or Google Docs?

    We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these days, now that employees work anywhere, anytime.

    Learn how:
    OpenDNS Umbrella restores visibility and enforcement easier than any other solution.
    Unlike VPN’ing, we do not add latency, hog memory, or burden the end-user.
    Unlike endpoint protections, we block threats before the first victim is hit.
  • Enterprise architects sometimes shy away from internally segmentation data centers out of concerns over performance and agility. But implementing internal segmentation need not involve a performance hit. Learn how to approach internal segmentation, including how to avoid the most common pitfalls, and how to integrate segmentation into your broader security strategy. And most of all, learn why you can’t afford not to segment: the benefits it provides in terms of control, compliance, and protection.
  • Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.

    This webinar will detail key insights from the Imperva Application Defense Center annual Web Application Attack Report. Attend this webinar for an in-depth view of the threat landscape for the year. We will:
    - Discuss hacking trends and shifts
    - Provide breach analysis by geography, industry and attack type
    - Detail next steps for improved security controls and risk management processes

Embed in website or blog