For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
Bridging the Trust Gap for Identity Services Based Market GrowthJoni Brennan, Executive Director, Kantara InitiativeIn the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.Read more >
CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:
How many were affected by a successful data breach in 2014
How many think they’ll be victimized in 2015
What portion of IT spending is dedicated to security
Which cyberthreats concern security professionals the most
Which security defenses are present or planned for acquisition
Plus two dozen additional insights from security professionals just like you
As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.
In this webinar, Eric and Dave will discuss:
• How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
• How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
• Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?
The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.
Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:
- User customizable and flexible reporting
- Centralized asset store for extended scalability
- Enhanced exploit matching and filtering
- Interactive and adaptive attack paths
Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.
Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.
In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:
• Engaging human sensors as a layer of defense
• Utilizing user reports to detect malware
• Real use cases of user detection within our enterprise
As major breaches cause financial and reputational damage to businesses across all industries, there is a push for cyber security to become a board level issue. A recent survey from BDO International found 59% of board directors have become more involved in cyber security within the past twelve months. But how can board members unfamiliar with the ins and outs of network security effectively manage these risks?
Join BitSight’s VP of Business Development, Jacob Olcott, Partner at McKenna Long & Aldridge, Bill Ide and the Executive Director of The Conference Board Governance Center, Donna Dabney on Thursday, March 26 at 11:00am EDT for an online roundtable discussion on board involvement in cyber security. The panelists will discuss how both security leaders and board members should approach the communication and management of cyber risks in the enterprise.
Attendees will also learn:
- What cyber security metrics are most important for the board
- Methods for security leaders to communicate cyber issues across the enterprise
- How BitSight’s platform enables communication on security performance throughout the enterprise
Cyber security threats are persistent and constantly evolving. A vulnerable website puts a business’s reputation – not to mention its revenue – at risk. In this webcast, Reynold Harbin, VP of Product Management for Neustar, discusses exclusive new IDG research about DNS deployments, the importance of robust DNS security, and the best way to defend against a rising tide of threats.
Mirror mirror on the wall who's the riskiest of them all?
It's no secret that companies are adopting cloud applications like Office 365, Google Apps, Dropbox and Salesforce to help improve their business. With the cost savings and increased scale and efficiency of the cloud, who could blame them? But what some companies tend to overlook is that there is a level of risk when it comes to each of these apps, and that it can differ based on each company's use case.
Do you know what cloud applications are running in your infrastructure today? How about the ones putting your sensitive data at the most amount of risk? Do you have a way of finding out?
In this webinar Chris Hines, Product Manager at Bitglass will teach you what's necessary when it comes to determining your company's riskiest cloud applications.
The continued growth of the business networks that employees, partners and customers use to share information is driving the need for collaboration tools that are available beyond firewalls, on any device. With the cloud emerging as the preferred place for these technologies, and a crowded landscape of potential vendors, how can your organization make the right choice?
Join Forrester Research Analyst TJ Keitt and Product Marketing Director Peter Brown of Intralinks as they review:
- The emerging types of cloud collaboration technologies and the key considerations to think through
- The inherent value in having a collaboration platform that connects people to information
- How to align the organizational need to collaborate while keeping information secure at every touchpoint
You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.