According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.
Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.
You will learn about:
- The ever-changing threat landscape, and how it affects your business
- Key Considerations for your Cyber Security Strategy
- Insight into real-life case studies
Visualising your organisation’s complete attack surface—all the known, unknown, and rogue and phoney digital assets across digital channels—is central to a robust and effective digital threat management (DTM) program. Having this complete picture also provides an understanding of vulnerabilities associated with those assets, and which should be prioritized highest (e.g., old vulnerabilities, which are the most often exploited, and new vulnerabilities like zero-days).
During its discovery process, RiskIQ’s Digital Footprint surveys the entire internet, looking for digital assets that belong to or are connected to you, across the web, social, and mobile channels. Register for our upcoming webinar with RiskIQ’s Digital Footprint Product Manager, Vamsi Gullapalli, where he discusses:
- What is RiskIQ Digital Footprint?
- Where it fits in your security stack
- How it can improve your vulnerability and asset management processes by making them more complete and up-to-date
- Real life uses cases from customers who have improved their security posture and digital threat management programs with RiskIQ
Also, you’ll hear from a RiskIQ customer and security chief on how he used Digital Footprint to improve his organisation’s risk posture.
According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.Read more >
Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.
The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
The vast majority of security solutions are focused on an out-of-date model of chasing known malware that is already weaponized – ready to do damage. Today’s security landscape has shifted away from this, with the majority of modern attacks bypassing conventional security systems by delivering benign-looking data. These benign components subvert interpreters and assemble to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure.
Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?
Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.
- Griff James, Director at Damrod Analysis
- Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
- Will Lymer, Chief Growth Officer at Loki Labs
The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.
Join renowned security experts Toels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.
Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.
About the Speaker:
John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.
Sean Sullivan, Security Advisor and researcher at F-Secure, discusses how the Internet of Things (IoT) exposes consumers to potential cybercrime, which industries are most susceptible to cyber attacks, the percentage of companies that are confident in their cyber security measures, and predictions for the cyber security industry.Read more >
Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk.
But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives in a way that business professionals will understand--and fund.
Cyber leaders have a massive visibility problem that is only growing as the number of corporate unmanaged IP-connected devices continues to explode. Organizations are discovering up to 60 percent more devices on their network than previously known – amidst this rapid growth, where should CISOs and CIOs focus to increase their visibility, while at the same time manage and maintain security hygiene and compliance? Add to this, the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise, and the challenge to prepare against threat actors seems overwhelming.
In a rare opportunity to hear from an industry leader, join Dave DeWalt, former CEO of FireEye and McAfee, along with Rob McNutt, Vice President of Emerging Technologies at ForeScout, and Stuart Solomon, Chief Technology & Strategy Officer at Optiv, as they share insights and lessons on how today’s cyber leaders should be preparing for tomorrow’s expanded threats.
Join this webinar to learn:
- Where CISOs and CIOs should focus their resources to improve visibility
- How device visibility can enable security hygiene and compliance
- How organizations can shrink the attack surface created by IoT and OT
With the volume of attacks growing, the mutations and variations in attack methods broadening, and a seemingly endless catalog of defensive solutions available, it can be difficult to prioritize your security investments and operations. Join our cyber defense experts to hear tips on how to cut through the noise, effectively identify the most likely and riskiest attacks and thwarting them efficiently through balanced and targeted investment in resources, time and technology.
About the Speaker:
Pete Clay, Katzcy Consulting Advisory Board member, is a 20+ year veteran in the cybersecurity industry with experience in security operations, mergers and acquisitions, cyber policy, risk management, and program management.
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Verpassen Sie die Möglichkeit nicht, sich mit den führenden Analysten von Symantec über die Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) aus dem Jahr 2018 auszutauschen.
Erhalten Sie tiefe Einblicke in die Themen:
- Der Goldrausch der Cryptominen
- Der sich wandelnde Trend der Ransomware-Infektionen
- Details über gezielte Cyber-Angriffe
- Infektionsgefahren durch Softwareupdates
- Die Welle der mobilen und IoT Bedrohungen setzt sich fort
Learn more about how IoT is posing new cyber threats, how Fortune 500 companies are integrating cyber security into their firm, biggest threats & opportunities, and more with Stew Wolfe, Associate Principal, Cisco Global Security, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use.
Join Chief Research Scientist at Comodo Cybersecurity and NATO Cooperative Cyber Defense Centre of Excellence Ambassador, Dr. Kenneth Geers as he analyzes how geopolitical events affect malware in the world's hottest cyber-attack zones. Webinar attendees will learn:
• How cyber defenders benefit from spending more time on strategic cyber defense analysis.
• Why cities, countries, continents, verticals and even geopolitical events have their own malware fingerprint.
• How threat research and intelligence can quickly provide actionable intelligence to Network Security professionals at the tactical level.
The session draws on data from Comodo Cybersecurity's Threat Intelligence Team's analysis of 300 million malware incidents in the first six months of 2018 and how you can leverage this technology to enhance your IT infrastructure.
This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.
Join this webinar presentation to learn:
- Key lessons on the value of micro-marketing
- Lessons from cybernetics
- The value of cyber resilience in healthcare
About the Presenter:
Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.
Attend this webinar and learn about:
• Top cyberthreats facing financial institutions
• Financial services compliance evolution, security monitoring and incident response
• Differences between SIEM, SOC, and SOC-as-a-service
• Monitoring on premises and cloud resources without adding headcount
To gain insights on these challenges and how to solve them, save your seat now!
Part 3: Detect - Threat Intelligence by Eric Lam [Director, Enterprise Cybersecurity Group, Microsoft Asia]. Learn the concepts and ideas around threat detection that forms a very essential part of every organisation's cybersecurity strategy. The fundamentals of threat detection is threat intelligence which refers to all the information that comes from the security systems which the organistion has to keep it safe.Read more >
Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
• Learn the primary attack vectors used by cybercriminals to infiltrate an organization
• Understand how different attack techniques work and what damage they can do
• Find out what protection methods work and where they fall short
• Get answers directly from our chief bad-guy researcher during the Q&
To further enhance the cyber resilience of the banking sector in Hong Kong, the Hong Kong Monetary Authority launched the Cybersecurity Fortification Initiative. Learn more about what it is through experts in the field.Read more >