Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Over 150 million connected cars are expected on the roads and smart cities will house 9.7 billion connected devices by 2020, according to Gartner. With the increased adoption of Internet-connected devices come new opportunities for hackers to launch attacks on unprecedented scale and impact. The attack surface and threats have changed. How is cybersecurity keeping up? Listen to leading experts as they discuss the security implications for the Internet of Everything and how we need to prepare.
WikiLeaks released thousands of files in early March that it identifies as CIA documents outlining the agency's cyber espionage tools. The documents include instructions, support documents and conversations about exploiting smartphone vulnerabilities and using smart TVs as listening devices.
The first release was named "Year Zero", and it will be part of a series of CIA-related leaks named "Vault 7".
Join the conversation on BrightTALK and discover how the WikiLeaks documents affect you, your company and the cybersecurity on a national level.
Cloudbleed is the newest security flaw affecting the Internet. The massive memory leak from Cloudflare, a web services and security company, was discovered by a Google employee and disclosed by Cloudflare in February.
The leak may have exposed user data for thousands of sites using the Cloudflare Content Delivery Network (CDN) service. Cloudbleed leaked information like passwords, message contents, and more for at least a week before the hole was finally fixed.
Join the discussion and discover how Cloudbleed affects you and your organization, as well as the steps to take today to better protect your data.
Cyber security used to be focused purely on the perimeter, but advanced computing developments are changing the environment and the steps required to keep your organization breach-free. Improvements in AI and machine learning, advanced breach analysis and automated responses along with new schools of thought for cyber security strategy are all changing the game. Hear from the cutting-edge experts who are leading the way to the future of cybersecurity.
DevOps is no longer a trend, it’s a necessary practice for a business to move with agility and scalability in today’s market. How do you create a collaborative relationship between developers and operations while maintaining service to your customers? Hear from leading experts as they discuss how to cultivate and environment for this winning collaboration and how it can connect with other ITSM practices to benefit your business.
Discover the latest industry trends and takeaways from RSA 2017. Join the livestream panel discussions in real time with some of the leading security experts on cyber attacks and the human factor, IoT and diversity. Learn what security professionals are focusing on in 2017, where they see the industry going and the technologies powering the shift.
To close out 2016 we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll then use that information to assess the key threats that’ll be on the horizon in 2017 and what you can do to protect your organisation.
With millions of pieces of personal data lost last year, this month's Summit will focus on whether data breaches are inevitable and if the worst happens, how you should respond to protect your organisation.
The Privacy vs Security debate polarises audiences in the face of landmark data privacy rulings, whistle-blower revelations and headline grabbing data losses. Where should our priorities lie? Ensuring our sensitive data is protected or kept private?
This month’s Summit will focus on advanced threat protection, new vulnerabilities, reverse engineering, the human factor, zero day attacks, vulnerable apps and all the other elements that threaten your organisation's network.