The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Over 150 million connected cars are expected on the roads and smart cities will house 9.7 billion connected devices by 2020, according to Gartner. With the increased adoption of Internet-connected devices come new opportunities for hackers to launch attacks on unprecedented scale and impact. The attack surface and threats have changed. How is cybersecurity keeping up? Listen to leading experts as they discuss the security implications for the Internet of Everything and how we need to prepare.
Financial institutions remain the primary target for cyber criminals and with crippling GDPR penalties on the horizon; massive amounts of customer data at risk and billions of dollars potentially on the line, now more than ever financial institutions need to be the industry-leaders when it comes information security. Find out from the industry’s leading thinkers as they discuss best practices for data governance & compliance, security developments, fraud detection, ransomware and cyber attacks prevention for financial institutions.
WikiLeaks released thousands of files in early March that it identifies as CIA documents outlining the agency's cyber espionage tools. The documents include instructions, support documents and conversations about exploiting smartphone vulnerabilities and using smart TVs as listening devices.
The first release was named "Year Zero", and it will be part of a series of CIA-related leaks named "Vault 7".
Join the conversation on BrightTALK and discover how the WikiLeaks documents affect you, your company and the cybersecurity on a national level.
Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defense. Listen to top experts across the industry and government as they discuss the latest attack trends, the most valuable assets at risk, and the defenses needed to secure them.
Cloudbleed is the newest security flaw affecting the Internet. The massive memory leak from Cloudflare, a web services and security company, was discovered by a Google employee and disclosed by Cloudflare in February.
The leak may have exposed user data for thousands of sites using the Cloudflare Content Delivery Network (CDN) service. Cloudbleed leaked information like passwords, message contents, and more for at least a week before the hole was finally fixed.
Join the discussion and discover how Cloudbleed affects you and your organization, as well as the steps to take today to better protect your data.
Cyber security used to be focused purely on the perimeter, but advanced computing developments are changing the environment and the steps required to keep your organization breach-free. Improvements in AI and machine learning, advanced breach analysis and automated responses along with new schools of thought for cyber security strategy are all changing the game. Hear from the cutting-edge experts who are leading the way to the future of cybersecurity.
DevOps is no longer a trend, it’s a necessary practice for a business to move with agility and scalability in today’s market. How do you create a collaborative relationship between developers and operations while maintaining service to your customers? Hear from leading experts as they discuss how to cultivate and environment for this winning collaboration and how it can connect with other ITSM practices to benefit your business.
Discover the latest industry trends and takeaways from RSA 2017. Join the livestream panel discussions in real time with some of the leading security experts on cyber attacks and the human factor, IoT and diversity. Learn what security professionals are focusing on in 2017, where they see the industry going and the technologies powering the shift.
To close out 2016 we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll then use that information to assess the key threats that’ll be on the horizon in 2017 and what you can do to protect your organisation.