The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Gartner predicts there will be 21 billion Internet-connected devices by 2020. Securing the Internet of Things is critical, as connected devices are easy to hack and use in DDoS attacks, for cyber snooping and to disrupt entire cities, agencies and industries. IT and IoT leaders will discuss the biggest IoT security challenges, the new threats and vulnerabilities on the horizon and the tools specializing in protecting the IoT.
Gartner predicts cybersecurity spend will grow 7 percent to $86 billion in 2017. With high-profile breaches and cyber attacks on the rise, security professionals are under increased pressure to better protect their organizations. This summit will explore why investing in cybersecurity makes businesses sense and what CISOs, CSOs, and CIOs need to know to better communicate their security strategy to the board.
Take look back at the costliest attacks and the most newsworthy breaches of 2017. Who or what has been to blame and what lessons can you the security professionals take from the year? Hear from the top industry experts as they review this past year’s threatscape and discuss what you need to do address today’s key vulnerabilities in 2018.
Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches. Hear from expert thought leaders as they discuss the key opportunities that the cloud brings, whilst also covering the risks that continue to foster mistrust.
With high-profile ransomware attacks on the rise in 2017 (Wannacry, NotPetya), organizations worldwide are investing in cybersecurity to ensure their most critical data assets are protected. From educating employees to implementing technology, discover the key areas enterprises are focusing on and the steps to develop a robust security strategy.
Equifax disclosed a massive cybersecurity breach in early September, in which the personal information of as many as 143 million Americans, almost half the country, was compromised.
Top cyber security leaders and researchers will discuss the impact of this breach on individuals and organizations of all sizes.
This BrightTALK Summit will be focused on information and cyber security in the Asia Pacific & Japan region, especially on the area's unique set of vulnerabilities, risks and challenges.
Asia Pacific is quickly becoming a lucrative market for cyber criminals and organisations are looking to boost their security stature and better protect their operations, sensitive data and finances.
Join this BrightTALK Summit where our selection of leading APAC-focused speakers will be giving talks on a variety of key security topics; from Ransomware to the IoT; DDoS to incident response; cloud, BYOD and more.
Our experts will be on hand to talk you through the myriad of security threats facing the APAC region and answer your questions as they go. Tune in and join the conversation.
Almost every successful cyber attack relies on a compromised identity. With cybercrime on the rise and attackers becoming more sophisticated, organizations worldwide need to remain vigilant in protecting their data assets and staying up to date on important regulation. Identity management, authentication and encryption, as well as compliance are essential to securing the modern business. The world's top security experts will discuss how technology, regulation and culture work together to build a robust cybersecurity posture.
Increasingly organizations face compliance, privacy and legal risks, increased costs and decreased productivity from ongoing accumulation of email, files and other electronic information. The challenge is moving from simply talking about these challenges to executing effective, real-world and smart programs to reduce risk, ensure compliance and lower costs. Join us for this summit where we will address practical strategies on what to do, how to get started, and how to keep your program on track and working.
A massive cyber attack in late June 27, 2017 disrupted the operations of major banks, utilities, power plants and government agencies in the Ukraine. The attack quickly spread to other countries. Initially called Petya, then NotPetya, was this a ransomware attack, a wiper or an act of cyber warfare?Join the conversations as security leaders, engineers and researchers discuss the large-scale implications of the attack and how to prepare against similar attacks in the future.