Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The third webinar in the series will cover the topic of Business Continuity Management from an executive perspective. This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.
  • Research reveals that 63% of internally developed applications are initially out of compliance with OWASP Top 10 standards. Join this webinar to learn how vulnerabilities end up in your software.
  • Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

    Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.
  • An Analysis of CyberEdge's 2016 Cyberthreat Defense Report

    Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

    Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

    Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

    This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

    You’ll discover:

    • Deep insights into how IT security professionals perceive cyberthreats
    • What they’re doing to defend against threats
    • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

    See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.
  • It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

    Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..
  • There is a direct correlation between the size of an enterprise’s attack surface and its risk profile. The greater the number of networked applications supported by the enterprise and the greater number of users granted access, the greater the chance that one of those users will be compromised and hackers will gain a foothold to the broad enterprise application environment. In fact, this attack vector has been exploited by hackers in most of the high profile data breaches dominating headlines over the past two years. However, enterprises are now adopting more advanced application isolation and segmentation techniques that actually shrink the attack surface and reduce the risk of a data breach. This presentation will cover use case examples of application isolation, cryptographic segmentation, and role-based access control methodologies that limit application exposure while containing and minimizing the damage of breaches when they occur.
  • One of the biggest challenges organizations face when trying to reduce the attack surface for cybercriminals and hackers is the lack of visibility and control over their IT environments, devices and applications. The ever growing number of software vulnerabilities makes it even more critical to leverage data from Software Asset Management (SAM) programs to help reduce security risk.

    In this webinar, you will hear how to leverage existing SAM data sources such as discovery and inventory data, unlicensed and unauthorized software, along with vulnerability intelligence data, to drive mitigation of security risk through effective reduction of the attack surface.
  • Risk Management is not a standalone activity carried out by a company’s risk experts; it is part of the responsibilities of management and a concern to all of the organization’s stakeholders. Risk identification and management are vital to strategic planning, project development and change management. Correctly instituted, Operational Risk Management (ORM) is a cross-functional and dynamic process that is critical in helping decision-makers reach informed choices based on facts and data, not opinions. It helps management prioritize actions and distinguish the best route amid alternative courses of action. Securing information and assets is not a silo within the security or IT business unit.

    The benefits are many, but ORM, once implemented, facilitates reducing operational and compliance costs and provides a detection system that will help reduce future exposure to risk. Ultimately it means a more resilient organization.

    Some industries are under more regulatory pressure than others, but the federal government is now also pushing forward risk-based frameworks. Organizations dubbed as “Critical Infrastructure” will need to ensure they have the controls and processes in place to meet requirements outlined by risk-based frameworks such as the NIST Cybersecurity Framework.

    Attendees will learn:
    - How risk based security is defined and harmonized internationally
    - What ORM look like in real life business models
    - The importance of the combination of People, Process and Technology in reducing risk
    - How Operational Risk Management fosters Operational Resilience

Embed in website or blog