2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and deep learning software to help them in the fight against digital crime and secure customer data.
In this webinar we explore how the threat of cybercrime has evolved and advise how these technologies and others can help companies strengthen their defences in 2018.
Matthew Gyde, Group Executive, Cybersecurity Dimension Data
VP, Global Security Strategy & Consulting Dimension Data
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.
Here’s a sampling of some of the predictions our cybersecurity experts will review:
•Ransomware Prevention more important than ever
•The Internet of Things blurs the line between personal and corporate security
•The era of Software Supply-Chain attacks has begun
•The Cloud will accelerate channel partner migration to next-generation security innovators
•Advances in Machine Learning will improve both patient care and cybersecurity
•Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.
Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.
•Identify where sensitive data is and who is accessing it.
•Protect that data with universal policies to ensure stability of networks and infrastructure.
•Detect cyber threats quickly and reduce the chance of breaches.
•Respond to threats with automated actions.
•Recover after a threat to produce reports to prove compliance.
New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the security of confidential and sensitive data.
August 30 2017 is the first milestone date for this regulation. What is the state of your compliance?
Join us for a lively discussion with a panel of experts around the following topics:
•Understanding the legal drivers for the DFS regulation In addition to the directly covered entities of DFS, FINRA & SEC covered entities should be closely following the DFS
•What this new regulation means to you
•Why a thorough risk assessment is necessary
•Best practices and tools for fully complying with this new regulation
According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.
Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.
Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
Today’s cyber attackers exploit human weakness more often than infrastructure gaps: 90% of attacks target email, but social media links and mobile apps are also fair game.
In this webinar, you'll learn:
-How cyber attackers gain visibility into organizations
-How you can see across all major threat entry points and stop attacks
-How to stop business email compromise (BEC), credential phishing, ransomware and other advanced threats
-How to eliminate social media risk so you can focus on social success
-How to protect against malicious apps that mishandle data or install malware
Cloudera empowers cybersecurity innovators to proactively secure the enterprise by accelerating threat detection, investigation, and response through machine learning and complete enterprise visibility. Join us for a live demo of Cloudera’s cybersecurity solution, based on Apache Spot, where we will demonstrate how Cloudera can enable anomaly detection, behavior analytics, and comprehensive access across all enterprise data using an open, scalable platform.Read more >
To stay ahead of attackers, IT security teams are connecting their sophisticated threat mitigation infrastructure to a wide range of threat intelligence services: their own network data, open-source intel, commercial feeds, and even peers threat intel. Consuming this data is a starting point, but in many cases the volume of information generated is overwhelming. Its increasingly clear that threat intelligence needs to be winnowed down to the essential critical events, and then have context added to those events to reach the ultimate goal: to turn a mountain of threat intelligence into a few meaningful actions.
This webinar covers the challenges associated with working with threat intelligence and the security solutions available to turn data into actions that meaningfully decrease the threat exposure window.
Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that it has been said there may be as many as 1 million unfilled cybersecurity jobs. Machine learning and automation is often heralded as a way to deal with this problem so that many incidents can be dealt with requiring pressing a button. While there is much promise is machine learning there are also many perils that need to be considered. Attackers know how we defend ourselves and they do use our defenses against us.
This talk will cover some of the open-source tools and techniques available for organizations to use to defend themselves while keeping in mind how attackers could undermine our efforts.
The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they discuss some practical steps to help you achieve cloud compliance with the regulations.
In this webinar, they will review:
- Common cloud compliance concerns from leading financial institutions and strategies to overcome these hurdles
- Tips for implementing the key requirements outlined in the regulation within your cloud environment
- The answers to your most common questions about cloud compliance
Nathan Narayan, Director of Product Management, Netskope
Livius Feinbaum, Principal Sales Engineer, Netskope
Neelum Khan, Product Evangelist, Netskope
When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.
Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.
Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:
• Identify sensitive data, where it is and who is accessing it
• Protect that data by establishing policies which prevent exposure
• Detect threats to which could extrapolate data by several means
• Respond to threats with automated actions
• Recover after a threat to produce reports to prove compliance
Cybersecurity has been at the forefront of the US presidential election cycle. Join this interactive Q&A session with Mark Weatherford, Chief Cybersecurity Strategist at vArmour and discover the top cybersecurity challenges facing the elections and the new President, as well as some recommendations for improving security across industries and on a national level.Read more >
Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.
Applications are due by April 5th, 2017.
Come listen to learn:
• What the selection process includes and important application tips
• Understand what kind of training is provided (length and format)
• Hear from a recent graduate who will share her experience
• How this training academy and related certifications can help your career
We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.
Panel of speakers
Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
Al Huger: VP Engineering - Security, Cisco
An introduction to CDL, the world's first managed on-premise and cloud cybersecurity data lake. Developed with Intel and leading data center, cloud and security vendors, CDL is designed to democratize security analytics at scale, unlock the potential of today’s siloed security solutions, and provide a converged security analytic platform for enhancing and extending SIEM, EDR, IDS/IPS and other traditional systems as well as powering User and Entity Behavior Analytics (UEBA), Machine Learning (ML), Advanced Analytics (AA) and Artificial Intelligence (AI) solutions. CDL enables enterprises to win the war against today’s top digital business threats including malware, ransomware, Advanced Persistent Threats (APT), Data Leak Protection (DLP), insider threats, denial of service, botnets and nation state attacks.Read more >
Join Guest Forrester Research Senior Analyst, Heidi Shey, and Proofpoint SVP of Cybersecurity, Ryan Kalember, as they discuss what SaaS applications, BYOD, and GDPR (General Data Protection Regulation) mean for protecting data in today’s organizations. Hear what critical developments you should be factoring into your long-term information protection strategy.
Join this lively discussion to learn:
- Trends and implications for traditional network and endpoint DLP
- Real-world examples, such as the recent phishing worm, that illustrate new risks and why you need to think differently
- Strategies on how to move forward to protect your critical data
This session will discuss the generational GAP in Cybersecurity Talent. One of the biggest challenges facing the Cybersecurity Community is filling the GAP as quickly as possible through mentoring and bright talent eager to enter the field with little or no cybersecurity background.Read more >
With more than 500,000 unfilled cybersecurity jobs, an industry made up of 10 percent women and a trend of 56 percent of women leaving tech inside 10 years, we have a big problem. The stereotype of a hoodie-clad man at a terminal in a dark room -- a myth our schools perpetuate -- is harmful. Those in cybersecurity can change this right now! Come discuss how to sell all the diverse cybersecurity jobs to women, so they will want to join us.Read more >
2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?
Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:
· Major cybersecurity trends from the past year
· Cybersecurity tactics that worked – and didn’t work – in 2017
· How to take a proactive cybersecurity approach to fending off cyber threats
A glimpse at the world of cybersecurity can be a frightening one, especially for financial firms who face an increasing number and complexity of cyber attacks. Join us as we separate fact from fiction, debunking some of the most popular cybersecurity myths, and addressing best practices for your firm.
Topics of discussion will include:
- Why financial firms are particularly vulnerable to cyber attacks
- How industry myths can complicate your cybersecurity approach
- What steps your firm can take to develop a comprehensive cybersecurity and response program
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.
This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.
About the Presenter:
John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
The American Medical Association recently reported that 4 out of 5 healthcare providers and payer executives say their health IT systems have been compromised by cyberattacks.
On April 27, CMIT Solutions is hosting a free webinar to educate healthcare providers on how to manage cybersecurity risk. The webinar is hosted by CMIT Solutions of South Charlotte President Emory Simmons, who has over 30 years of risk management experience.
Join us on April 27 as we cover the following topics:
· The current cyber threats facing medical practices
· Case study of a recent cyber attack
· The framework your practice can follow to manage cybersecurity risk
· Actionable steps you can start taking immediately to protect your practice