The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Disruptive cyber attacks are on the rise and all industries are at risk. Enterprises and small businesses are scrambling to protect their critical data assets from attackers, putting the pressure on already thinly stretched security teams. CISOs and security researchers across the globe will share their findings on the biggest cyber threats to prepare for in 2019.
In the wake of major data breaches, highly personal information that used to prove our digital identities is now in the hands of fraudsters. The risk of this information being used in future frauds and cyber attacks is higher than ever. CISOs, CIOs, information governance, risk, privacy and identity leaders across the globe will debate the challenges of securing our digital identity, and the level of privacy we need to sacrifice in order to achieve security.
Enterprises are increasing their investment in the cloud. With data and workloads moving to the cloud, security is a key concern for CISOs and CTOs. The cloud security spend is expected to grow from $4.1 billion in 2017 to $12.7 billion in 2022. Industry leaders will examine the cyber threats to the cloud, the technological advances shaping the industry, and provide expert recommendations on how to improve cloud security.
Gartner predicts there will be 21 billion Internet-connected devices by 2020. Securing the Internet of Things is critical, as connected devices are easy to hack and use in DDoS attacks, for cyber snooping and to disrupt entire cities, agencies and industries. IT and IoT leaders will discuss the biggest IoT security challenges, the new threats and vulnerabilities on the horizon and the tools specializing in protecting the IoT.
It’s here. After months of planning and preparation you should now be prepared for the implementation of the General Data Protection Regulations. This BrightTALK special Summit will focus on the three pillars of GDPR: protection, compliance and response. We’ve arranged the leading speakers from the industry to give their insights into the steps that you need to take to ensure you’re fully up to speed.
Gartner predicts cybersecurity spend grew 7 percent to $86 billion in 2017. With high-profile breaches and cyber attacks on the rise, security professionals are under increased pressure to better protect their organizations. This summit will explore why investing in cybersecurity makes business sense and what CISOs, CSOs, and CIOs need to know to better communicate their security strategy to the board.
Cybercrime inevitably increases year-in-year-out, as the value of stolen data rises exponentially in value, so is there anything that you can do to fight the cyber criminals? This 3 day Summit will feature industry-leading security thinkers discussing the prominent areas that you should be concentrating on. Ransomware, DDoS, Social engineering and more will be covered as our experts give advice on staying secure and protected in 2018.
In November 2017, Uber disclosed that hackers accessed the personal data of its 57 million users and drivers. This massive data breach occurred in October 2016 and was kept secret for over a year. How does this breach affect you and your organization? What should companies do to combat insider threats and breaches? Top cyber security experts will discuss the broader implications of this breach and the lessons for CISO's as we prepare for 2018.
Take look back at the costliest attacks and the most newsworthy breaches of 2017. Who or what has been to blame and what lessons can you the security professionals take from the year? Hear from the top industry experts as they review this past year’s threatscape and discuss what you need to do address today’s key vulnerabilities in 2018.
Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches. Hear from expert thought leaders as they discuss the key opportunities that the cloud brings, whilst also covering the risks that continue to foster mistrust.