IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
    • Advanced Persistent Threats

    • Upcoming Oct 13 2015
    • From spear phishing to zero - days, advanced threats are targeting organizations from every angle. In addition to being difficult to detect, response and recovery can take months and cost millions of dollars, not to mention the cost to customer trust and loyalty. So how can you keep your organization safe? This summit will address some of the top concerns in the industry as well as the most recent research and best practices on defending your organization against advanced threats.
    • 4 webinars
    • View summit
    • Network Security EMEA

    • Upcoming Sep 9 2015
    • Hackers are getting smarter and even re-purposing what we thought was outdated technology. How can your organization stay safe?
    • 13 webinars
    • View summit
    • Network Security

    • Upcoming Sep 9 2015
    • Cybercrime and third party vulnerabilities are predicted to be some of the greatest threats to face organizations in 2016. Regardless of industry, network uptime and data protection are now business critical elements to every organization, especially when looking ahead into the holiday season. This summit will provide expert insight into what the security community has learned from the most notorious data breaches of 2015, what we can expect looking ahead into 2016 and the best practices and tools that will keep organizations, their networks and customers safe from network breaches.
    • 14 webinars
    • View summit
    • Risk-Based Security

    • Live Aug 3 2015
    • After the major data and network breaches of 2014, the C-Level has become increasingly invested in how the organization's security posture may serve to protect the business's bottom line. Still, effectively analyzing a threat-scape, proactively building out a security strategy and communicating with the C-Level can often be challenging. In this summit, industry thought leaders will discuss best practices on how to effectively instill confidence in the C-Suite as well as the available tools and technology to help effectively analyze and mitigate risk.
    • 34 webinars
    • View summit
    • Incident Response and Data Protection

    • Recorded: Jul 7 2015
    • Response and quality of incident control and data protection are what will save consumer trust and protect an organization's bottom line. However, most attacks will go unnoticed for weeks at a time and assessing, containing and understanding the full scope of the damage can take just as long. Join this summit to hear industry leaders discuss what they have learned from some of the most catastrophic data breaches of the last 12 months and what you can do to ensure that when your organization is attacked, your customers and employees are protected.
    • 37 webinars
    • View summit
    • Hackers and Threats June 2015

    • Recorded: Jun 3 2015
    • Organizations large and small are facing an uphill struggle to keep one-step-ahead of malicious actors who seek to steal their data and disrupt business operations. This summit features some of the leading thinkers in the cyber security space, who’ll be discussing detection, prevention and recovery; backed up with real-world case studies to help you keep you organization off the front page!
    • 41 webinars
    • View summit
    • DDoS Attacks: Bigger and badder than ever

    • Recorded: Apr 29 2015
    • Distributed denial of service (DDoS) attacks are the primary threat to the quality and availability of networks, online services and applications. 2014 was an inflection point for DDoS attacks, the beginning of the Hockey Stick Era, with massive attacks exceeding 400Gbps. More bandwidth, better attack tools and sophisticated attackers focus on leveraging the reflection/amplification capabilities of DNS, NTP and other vulnerable protocols means that massive attack size is now a fact of life for network operators. Whether you are using Flowspec to manage network traffic flow, or you are setting out on the virtualization path with SDN and NFV, your organization must be equipped with a comprehensive DDoS protection plan to ensure the secure availability that’s expected from you. Join Rakesh Shah, Director of Product Marketing and Strategy at Arbor Networks, for a DDoS protection focused summit featuring these presentations: Best Practices for DDoS Protection; Deploying Flowspec in a Service Provider Environment; SDN and NFV: Protecting the Next Wave of Infrastructure.
    • 3 webinars
    • View summit
    • Network Security

    • Recorded: Apr 1 2015
    • DDoS attacks and stolen credentials are still a huge problem. If hackers can take down the NASDAQ, how can ordinary organizations stay safe?
    • 27 webinars
    • View summit
    • Advanced Threat Protection

    • Recorded: Mar 4 2015
    • How have advanced threats evolved in over the last year and what if any trends are we seeing? This summit will address how industry experts are dealing with advanced threats.
    • 45 webinars
    • View summit