Hi [[ session.user.profile.firstName ]]
Sort by:
    • Creating a Winning Security Strategy for 2019
      Creating a Winning Security Strategy for 2019 Israel Barak, Cybereason | Dario Forte, DFLabs Recorded: Dec 5 2018 9:30 am UTC 49 mins
    • Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

      CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

      Join top security experts for an interactive Q&A panel discussion on:
      - The key factors CISOs should consider for their cybersecurity strategy
      - The current and future threatscape
      - Platform Security for 2019
      - Technological solutions that make CISOs' lives easier
      - How organizations are coping with the shortage of qualified security workforce
      - How CISOs can better communicate their strategy to the board

      Panelists:
      Israel Barak,CSO, Cybereason
      Dario Forte, CEO, DFLabs

      Panel moderated by:
      Amar Singh, Founder & CEO, Cyber Management Alliance

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • The 2019 Security Strategy from the former CSO of Facebook and Uber
      The 2019 Security Strategy from the former CSO of Facebook and Uber Joe Sullivan, Chief Security Officer of Cloudflare & Tim Fong, Head of Security Solutions Upcoming: Dec 10 2018 5:00 pm UTC 60 mins
    • How are you planning to secure your employees, your company, and your customers in 2019?

      Prior to joining Cloudflare as its Chief Security Officer (CSO) in 2018, Joe Sullivan spent 5+ years as CSO for Facebook and 2.5 years as CSO for Uber. He also previously held security and legal roles at PayPal and eBay and served on the Obama Administration as a member of the Commission on Enhancing National Cybersecurity.

      With over a decade of experience from some of the world’s most influential companies, Joe will share the core strategies he is taking to help protect Cloudflare and, as a result, its 12M domains who rely on its services for security and performance.


      Register now to learn:

      - Major security risks to prepare for in 2019
      - The three areas Cloudflare is using its own products to secure the company
      - The plan to improve internal discipline around “incident response”
      - The critical shift in thinking and strategy around the world becoming “borderless”
      - The “security maturity model” to evaluate and plan the security roadmap

      If you and your team are in the middle of planning how to maintain and improve your security posture for 2019, sign up to attend now. Registrants will also get a copy of the actual Security Maturity Model you can use with your own team.

      Read more >
    • Facing Forward: Cyber Security in 2019 and Beyond
      Facing Forward: Cyber Security in 2019 and Beyond Christopher Porter, Chief Intelligence Strategist, FireEye Upcoming: Dec 11 2018 9:00 pm UTC 60 mins
    • As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

      Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye iSIGHT Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

      •Threats to the aviation industry, including cyber espionage and cybercrime
      •What to expect from established and emerging nation states
      •How threat actors are changing their tactics to stay ahead of defenders

      Register today to learn what lies ahead and stay one step ahead of cyber security threats.

      Read more >
    • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
      [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Recorded: Apr 24 2018 2:00 pm UTC 63 mins
    • Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

      Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

      Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

      ----------------------------
      "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

      - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

      "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
      - PWC Global State of Info Security Survey, 2015

      Read more >
    • Cyber Security Risk Management –New Methods to Gain Control
      Cyber Security Risk Management –New Methods to Gain Control Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray Recorded: Oct 23 2018 3:00 pm UTC 58 mins
    • Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

      This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

      Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

      • Security risks across the complete cyber attack lifecycle, not only detection and response
      • A simple and proven method for approaching the risk reality facing all organizations
      • The rising cyber security insurance market and how it will affect risk management efforts
      • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
      • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
      • Best practice exercises to test your incident response plan based on real-world experiences
      • Techniques for effectively reporting risk and capability needs to a Board-level audience

      Read more >
    • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
      Defending Against Today's Sophisticated Attacks on Healthcare Organisations Axel Wirth, Distinguished Healthcare Architect Upcoming: Dec 12 2018 3:00 am UTC 67 mins
    • In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

      Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

      • The latest threat trends and incidents
      • The challenges of securing healthcare ecosystems
      • Effective cybersecurity strategies

      Read more >
    • A View from the IT Practitioner: End User Predictions for 2019
      A View from the IT Practitioner: End User Predictions for 2019 Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Upcoming: Dec 11 2018 3:00 pm UTC 60 mins
    • 2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

      We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

      Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

      - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
      - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
      - Which cyber security trends have impacted their cyber security strategy
      - How to prepare your organisation for these new trends

      Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.

      Read more >
    • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
      ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 8:30 pm UTC 62 mins
    • Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
      Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
      Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.

      Read more >
    • CEO Insights: 2019 Cybersecurity Predictions
      CEO Insights: 2019 Cybersecurity Predictions Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Upcoming: Dec 10 2018 9:00 pm UTC 45 mins
    • Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

      The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

      In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

      Here is a preview of the top 3 predictions that is bound to surprise you.

      - The new approach cybercriminals will employ to get into target organizations
      - Which industries will be most attractive to 2019’s hackers
      - Whether new security technologies can live up to their expectations
      - And much more!

      To hear from this security expert and to learn what to look for in 2019, register now.

      Read more >
    • 2018 – The year in cyber crime
      2018 – The year in cyber crime Orla Cox, Director Security Response, Symantec Processing: Dec 10 2018 2:00 pm UTC 60 mins
    • Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

      From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

      Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

      • How targeted attacks are evolving to exploit new technologies like IoT.
      • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
      • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come

      Read more >