The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Cyber security used to be focused purely on the perimeter, but advanced computing developments are changing the environment and the steps required to keep your organization breach-free. Improvements in AI and machine learning, advanced breach analysis and automated responses along with new schools of thought for cyber security strategy are all changing the game. Hear from the cutting-edge experts who are leading the way to the future of cybersecurity.
To close out 2016 we’ll be looking at the year in review; the big breaches and notable disclosed vulnerabilities. We’ll then use that information to assess the key threats that’ll be on the horizon in 2017 and what you can do to protect your organisation.
According to Cloud Security Alliance (CSA) research, the top security concern cited is the risk of data breaches, followed by the use of weak identity access management and insecure APIs. To encourage continued adoption of the cloud, companies need to focus on improving trust and security. Join this month’s summit as experts discuss cloud security, and the importance of cloud backup in your organization's business continuity and disaster recovery planning.
With millions of pieces of personal data lost last year, this month's Summit will focus on whether data breaches are inevitable and if the worst happens, how you should respond to protect your organisation.
On October 21, 2016, internet infrastructure company Dyn suffered multiple DDoS attacks that brought down major Internet sites like Twitter, Spotify, Netflix, Paypal, etc. Join the discussions and learn more about what happened, how IoT devices were used in the attack, and what organizations can learn from this attack to strengthen their cybersecurity going forward.
The results of the November US elections affect industries and decision makers almost immediately. One of which, cyber security has been at the forefront of this election cycle. Join this series to discover what we can expect after all ballots have been cast and counted this Fall.
The Privacy vs Security debate polarises audiences in the face of landmark data privacy rulings, whistle-blower revelations and headline grabbing data losses. Where should our priorities lie? Ensuring our sensitive data is protected or kept private?
In December, Yahoo disclosed that more than 1 billion accounts were affected in a breach that occurred in 2013. This is separate from the 2014 breach Yahoo disclosed earlier this year in which account information for more than 500 million Yahoo users was stolen.
Join the discussion as some of the top cybersecurity experts explain the facts around these breaches, who might be affected and the steps users and companies should take today to better protect their data.
This month’s Summit will focus on advanced threat protection, new vulnerabilities, reverse engineering, the human factor, zero day attacks, vulnerable apps and all the other elements that threaten your organisation's network.
Investigating and analysing the threatscape can provide a massive advantage when applied effectively, but what are the best steps to take? The industry's leading speakers will be at our August Summit, debating that exact question.