The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
To close out 2016 we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll then use that information to assess the key threats that’ll be on the horizon in 2017 and what you can do to protect your organisation.
According to Cloud Security Alliance (CSA) research, the top security concern cited is the risk of data breaches, followed by the use of weak identity access management and insecure APIs. To encourage continued adoption of the cloud, companies need to focus on improving trust and security. Join this month’s summit as experts discuss cloud security, and the importance of cloud backup in your organization's business continuity and disaster recovery planning.
With millions of pieces of personal data lost last year, this month's Summit will focus on whether data breaches are inevitable and if the worst happens, how you should respond to protect your organisation.
On October 21, 2016, internet infrastructure company Dyn suffered multiple DDoS attacks that brought down major Internet sites like Twitter, Spotify, Netflix, Paypal, etc. Join the discussions and learn more about what happened, how IoT devices were used in the attack, and what organizations can learn from this attack to strengthen their cybersecurity going forward.
The results of the November US elections affect industries and decision makers almost immediately. One of which, cyber security has been at the forefront of this election cycle. Join this series to discover what we can expect after all ballots have been cast and counted this Fall.
The Privacy vs Security debate polarises audiences in the face of landmark data privacy rulings, whistle-blower revelations and headline grabbing data losses. Where should our priorities lie? Ensuring our sensitive data is protected or kept private?
Yahoo recently confirmed that account information for more than 500 million Yahoo users was stolen in a 2014 data breach.
Some of the top cybersecurity experts will explain the facts around the breach, who might be affected and the steps users and companies should take today to better protect their data.
This month’s Summit will focus on advanced threat protection, new vulnerabilities, reverse engineering, the human factor, zero day attacks, vulnerable apps and all the other elements that threaten your organisation's network.
Investigating and analysing the threatscape can provide a massive advantage when applied effectively, but what are the best steps to take? The industry's leading speakers will be at our August Summit, debating that exact question.
Effectively and efficiently protecting an organization's data is imperative to its overall health and success. As the adoption and growth of workplace mobility, BYOD and flexible working continues, securing data will continue to be a top priority for every organization for the rest of this decade. Join this summit to discover the various options available to enterprises to ensure they have a comprehensive and cohesive backup and recovery strategy in place.