Hi [[ session.user.profile.firstName ]]

IT Security

    • Mobile and App Security

    • Upcoming May 24 2016
    • This month, the debate will range around our mobile devices and how we use them in the enterprise. Speakers will debate BYOD, device management, developing and designing secure apps and how you can protect your business from the latest mobile and app-based threats.
    • 1 webinar
    • View summit
    • Data Protection & Incident Response

    • Upcoming Mar 15 2016
    • With millions of pieces of personal data lost last year, this month's Summit will focus on whether data breaches are inevitable and if the worst happens, how you should respond to protect your organisation.
    • 6 webinars
    • View summit
    • Data-driven Security

    • Live Feb 12 2016
    • The industry's leading speakers will be discussing threat analysis, security analytics, information sharing, vulnerability management and providing tips for how to build an intelligent and responsive data-driven security strategy.
    • 18 webinars
    • View summit
    • The Next Generation of Information Security

    • Recorded: Jan 7 2016
    • As disruptive technologies emerge, their defences need to evolve just as quickly. Securing the IOT; safe BYOD; cloud & virtualization security and developing secure apps from the ground up topics up for debate at this month’s Summit.
    • 28 webinars
    • View summit
    • Hackers Cybercrime and Espionage

    • Recorded: Nov 24 2015
    • Are pentests outdated in a month? How are organizations staying ahead of hackers and are there any tools that can help? Find out in this summit.
    • 37 webinars
    • View summit
    • Risk-based Security 2015

    • Recorded: Oct 21 2015
    • This year has seen a multitude of network and data breaches and the C-Level has become increasingly invested in how the organisation's security posture may serve to protect the business's bottom line. Still, effectively analysing the threatscaoe, proactively building out a security strategy and communicating with the C-Level can often be challenging. In this summit, industry thought leaders will discuss best practices on how to effectively build confidence in the C-Suite as well as the available tools and technology to help effectively analyse and mitigate risk.
    • 13 webinars
    • View summit
    • The Next Decade of DDoS Defense

    • Recorded: Oct 14 2015
    • Innovation in DDoS attack targets and techniques show no sign of slowing. Attackers today are launching sophisticated multi-vector attacks, targeting key applications and infrastructure. They continue to leverage the reflection amplification capabilities of DNS, NTP and other vulnerable protocols to launch very large attacks. Given the size and complexity of the modern DDoS attack, you need to be ready with the right technology, customizable deployment options and a process to quickly detect and stop DDoS attacks – before they impact your business.Join Tom Bienkowski, Director of Product Marketing, as he hosts a DDoS protection focused summit with Arbor's experts and customers, whose insights can help your organization understand the threat and defend itself using Arbor Products, Services and other industry best practices.
    • 3 webinars
    • View summit
    • Advanced Persistent Threats

    • Recorded: Sep 24 2015
    • From spear phishing to zero - days, advanced threats are targeting organizations from every angle. In addition to being difficult to detect, response and recovery can take months and cost millions of dollars, not to mention the cost to customer trust and loyalty. So how can you keep your organization safe? This summit will address some of the top concerns in the industry as well as the most recent research and best practices on defending your organization against advanced threats.
    • 30 webinars
    • View summit
    • Network Security EMEA

    • Recorded: Sep 9 2015
    • Hackers are getting smarter and even re-purposing what we thought was outdated technology. How can your organization stay safe?
    • 14 webinars
    • View summit