Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • As recently reported in the WSJ, 1% of users represent 75% of cybersecurity risk. We know, we were surprised too. This and other shocking truths about the causes and consequences of cloud vulnerabilities are uncovered in our latest cybersecurity report - gathered from our findings across over 10 million users, 1 billion cloud assets, and 91,000 unique apps.

    Get the inside scoop in our webinar where you’ll learn what it all means directly from our customer insights and data guru, Ayse Kaya Firat:

    – Top cloud cybersecurity trends that fly under your radar
    – What the distribution of cloud cybersecurity risk means for your ability to act on it
    – Three key security skills you should master for an immediately safer cloud environment
  • Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

    Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

    Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
    -Why they use a layered approach to security and how OpenDNS complements their security stack
    -How long it took to deploy OpenDNS Umbrella globally
    -How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
  • The future for women in Cyber Security is NOW.

    Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.

    At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.

    Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.

    “At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
  • Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.

    Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:

    * Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
    * Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
    * Notifications about breached/exposed credentials.
    * Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
    * Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more.

    Levi Strauss & Co. products are sold in more than 110 countries worldwide through a combination of chain retailers, department stores, online sites, and a global footprint of approximately 2,700 retail stores and shop-in-shops.

    ---

    Harris D. Schwartz is a global security, risk and investigations professional, with over 20 years of private sector experience; experience in the design, development and implementation of comprehensive security, investigations and threat intelligence strategies in a variety of business climates and organization cultures. Schwartz has developed security and risk programs for a variety of business sectors, designing comprehensive threat mitigation solutions, coordination and managing and mentoring of direct reports and multiple departments.
  • Cloud Cybersecurity Lessons From 1B Files and 10M Users

    Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?

    Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.

    Join this webinar to see where your organization stands against your peers and competitors.
  • The second in our Lowering Cyber Risk series with a focus on the Financial Services and helping to meet SOX compliance requirements.

    Cyber Risk is the Risk most underestimated by businesses according to the 2015 Allianz Risk Barometer.

    Learn how organisations are able to lower Cyber Risks associated with Loss Reputation, Business Interruption, and Loss of Customer Data, and thus improving Detection and Response capability.

    Discover how you can help to meet SOX compliance requirements by utilising User Behavioural Analytics, monitoring the user’s access to critical systems with required surveillance, forensics and reporting user access.

    Plus, see a LIVE DEMO with an example of an internal employee attempting to exfiltrate data from critical systems on a Financial Services environment.
  • Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
  • You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.

    Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:

    - Their cloud risk
    - How to quantify it for their corporate leadership and board of directors
    - How to convey it in the context of their overall cloud strategy
    - 6 steps to take right now to address cloud security risk
  • Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.

Embed in website or blog