Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

    • The 2018 Threatscape

    • Upcoming Nov 14 2017
    • Take look back at the costliest attacks and the most newsworthy breaches of 2017. Who or what has been to blame and what lessons can you the security professionals take from the year? Hear from the top industry experts as they review this past year’s threatscape and discuss what you need to do address today’s key vulnerabilities in 2018.
    • 8 webinars
    • View summit
    • The Future of Cloud Security

    • Upcoming Oct 24 2017
    • Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches. Hear from expert thought leaders as they discuss the key opportunities that the cloud brings, whilst also covering the risks that continue to foster mistrust.
    • 14 webinars
    • View summit
    • BrightTALK on the Equifax Data Breach

    • Live Sep 12 2017
    • Equifax disclosed a massive cybersecurity breach in early September, in which the personal information of as many as 143 million Americans, almost half the country, was compromised. Top cyber security leaders and researchers will discuss the impact of this breach on individuals and organizations of all sizes.
    • 11 webinars
    • View summit
    • Cyber Security in Asia Pacific

    • Recorded: Sep 12 2017
    • This BrightTALK Summit will be focused on information and cyber security in the Asia Pacific & Japan region, especially on the area's unique set of vulnerabilities, risks and challenges. Asia Pacific is quickly becoming a lucrative market for cyber criminals and organisations are looking to boost their security stature and better protect their operations, sensitive data and finances. Join this BrightTALK Summit where our selection of leading APAC-focused speakers will be giving talks on a variety of key security topics; from Ransomware to the IoT; DDoS to incident response; cloud, BYOD and more. Our experts will be on hand to talk you through the myriad of security threats facing the APAC region and answer your questions as they go. Tune in and join the conversation.
    • 6 webinars
    • View summit
    • Identity, Data Protection & Securing the Modern Business

    • Recorded: Aug 15 2017
    • Almost every successful cyber attack relies on a compromised identity. With cybercrime on the rise and attackers becoming more sophisticated, organizations worldwide need to remain vigilant in protecting their data assets and staying up to date on important regulation. Identity management, authentication and encryption, as well as compliance are essential to securing the modern business. The world's top security experts will discuss how technology, regulation and culture work together to build a robust cybersecurity posture.
    • 26 webinars
    • View summit
    • Information Governance: Strategies & Technologies

    • Recorded: Jul 18 2017
    • Increasingly organizations face compliance, privacy and legal risks, increased costs and decreased productivity from ongoing accumulation of email, files and other electronic information. The challenge is moving from simply talking about these challenges to executing effective, real-world and smart programs to reduce risk, ensure compliance and lower costs. Join us for this summit where we will address practical strategies on what to do, how to get started, and how to keep your program on track and working.
    • 13 webinars
    • View summit
    • Securing the Internet of Everything

    • Recorded: Jun 20 2017
    • Over 150 million connected cars are expected on the roads and smart cities will house 9.7 billion connected devices by 2020, according to Gartner. With the increased adoption of Internet-connected devices come new opportunities for hackers to launch attacks on unprecedented scale and impact. The attack surface and threats have changed. How is cybersecurity keeping up? Listen to leading experts as they discuss the security implications for the Internet of Everything and how we need to prepare.
    • 22 webinars
    • View summit
    • Virtual EMEA Cloud Security Summit - Alert Logic

    • Recorded: Jun 1 2017
    • The cloud is accelerating innovation and enabling technology transformation – it is changing every organisation, as cloud-based business-critical revenue impacting applications unlock competitive advantage, agility and enhance customer experiences. However, web application attacks are the number 1 source of security breaches, and many business and technology leaders alike struggle to keep up with the fast pace of securing those applications across an increasingly agile and complex infrastructure stack. This one-day virtual event will address the challenges and key security considerations for defending all the layers of your web application stack from vulnerabilities and the latest cyber security trends so that you can protect today, and scale for securing against the unknown of tomorrow.
    • 7 webinars
    • View summit
    • Threat Hunters in Action

    • Recorded: May 23 2017
    • Meet the individuals keeping your organizations safe. These real-life threat hunters proactively search through networks and datasets looking for threats that existing automated tools cannot detect. This series will feature individual threat hunters, and the tools and techniques they use to stay on top of their game. Discover their methods and skills, as well as their recommendations on how to stay up to date on current attack trends, next developments in their space and great resources for beginners to threat hunting. Save your spot and join the conversation.
    • 15 webinars
    • View summit
    • BrightTALK on WikiLeaks Vault 7

    • Recorded: Mar 17 2017
    • WikiLeaks released thousands of files in early March that it identifies as CIA documents outlining the agency's cyber espionage tools. The documents include instructions, support documents and conversations about exploiting smartphone vulnerabilities and using smart TVs as listening devices. The first release was named "Year Zero", and it will be part of a series of CIA-related leaks named "Vault 7". Join the conversation on BrightTALK and discover how the WikiLeaks documents affect you, your company and the cybersecurity on a national level.
    • 7 webinars
    • View summit