As cyber security risks increase in sophistication and number, organisations need to switch from responding to incidents, to identifying them to prevent them before they occur.
Developing a robust risk based approach to security needs to focus on supporting organisations to prioritise threats, understand the techniques that may be employed as part of the attack and evaluate the capability of controls to prevent, detect and respond to an attack. Without this knowledge, an organisation would struggle to determine the level of exposure to particular threats and if their cyber incident response plans are structured and ready to address these threats when they arise.
During this webinar, Steve Durbin, Managing Director of ISF, will discuss the need for a risk based approach to security and why it is an essential component to today’s business.
Schroder ISF Global High Yield
While cyberspace continues to provide opportunities for organisations they risk becoming disorientated and losing their way in a maze of uncertainty, as they grapple with complex technology, proliferation of data and increased regulation.
In this webinar Steve Durbin, Managing Director, ISF, discusses the threats organisations will be facing in 2018 and offers insights into how to address them.
Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors. Organisations that are well informed about emerging technologies and corresponding threats will be best placed to make winning decisions.
In this webinar, Steve Durbin, Managing Director, ISF, will examine the threats that organisations will be dealing with over the next two years and will provide advice on the best ways of handling them.
Mission critical assets can represent 80% of an organisation's total value. As critical assets are not always obvious, few organisations understand the extent to which these are exposed and need to be protected.
In this Webinar, Steve Durbin, Managing Director of the ISF, explains how to:
•identify an organisations mission critical information assets and the greatest threats to them
•determine how to counter adversarial threats
•determine the right protection to put in place and how to implement these protections.
People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.
In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?
As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.
In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers opportunities for leading organisations, this environment is uncertain and potentially dangerous. It is a place where hacktivists and cybercriminals are honing their skills and governments are introducing new regulation and legislation in response to major incidents and public concerns. Organisations are forced to continually adapt and rapidly respond.
In this webinar, Steve Durbin Managing Director at the ISF, will discuss the rapidly changing threat landscape, identify the key cyber challenges for 2017 and suggest ways of managing the associated risks.
In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.
In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
Last week Yahoo was hit with the biggest data breach of all time; with an estimated 500 million customer accounts compromised by hackers. The attack will have significant rippling effects on consumer trust, data protection standards and information security practices. The legal battle is now also only just beginning, with two key cases being heard in California, as Yahoo is sued for data-protection negligence.
But what will does all this mean to your business? Do you feel compromised professionally or personally? Were key mistakes made that you can avoid? How can you best prepare (in terms of incident response) to such a breach? Will the attack have lasting effects or will it disappear into the annuls of history alongside the Ashley Maddison, Target and Linkedin hacks. All these questions and more will be answered live, over webcam by Security expert and Managing Director of the ISF Steve Durbin.
Tune in, ask your burning questions and join the conversation on BrightTALK.
Aymeric Forest gibt ein Update zum Fonds sowie einen Marktausblick für 2016.Read more >
Barely a day goes by without news of a new cyber threat, or major data breach, arising from ‘malspace’ – an online environment inhabited by hacker groups, criminal organisations and espionage units. Regularly we’re reminded that these groups worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack.
Cybercrime often involves sophisticated, targeted attacks against an organisation, and additional security measures are required to respond to specific cybercrime-related attacks and to put in place cyber resilience programmes that anticipate uncertainty – there is an ever increasing need for a prepared and comprehensive rapid-response capability, as organisations will continue to be subject to cyber-attacks regardless of their best efforts to protect themselves.
But what are the threats that will cause the most upset in 2015? Cybercrime? Denial of Service? Cloud harvesting? And how can organisations best equip themselves to deal with a fast moving threat landscape? This webcast will highlight the key threats over the coming twelve months and offer ways of dealing with them and increasing your cyber resilience profile.
Organisations are struggling to cope with the increasingly sophisticated capabilities of external cyber crime syndicates and pace of attacks. However they often fail to consider the impact that insider threats pose to the business as people become more mobile and hyper-connected.
Organisations that wish to keep pace with these developments and remain financially viable will need to take action now to develop a forward looking cyber-resilience plan.
In this webinar, Steve Durbin, Managing Director of ISF, will provide guidance and tips on how organisations can identify and protect their most valuable assets from internal and external threats.
The technological landscape in the workplace has dramatically changed over the past ten years with the introduction of the ultraportable, smart mobile phone, tablet, phablet and many others. The benefits and opportunities are clear; a mobile, connected workforce able to multitask and communicate precise information globally with minimal disruption.
Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Many organisations are still playing catch up - BYOD polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workplace and connecting to corporate networks.
Ultimately, employers must accept that cloud and mobile working will appear as the de facto corporate infrastructure and should place a strong emphasis on employees understanding risks and their responsibilities in protecting corporate and personal data. But how?
This webcast will suggest ways to educate and inform users on operating in a safe and secure manner in a cloud and mobile environment.
With new technical vulnerabilities being discovered each day it has never been more important for businesses to assess and understand their critical infrastructure in an increasingly connected environment. Organisations need to be aware that cyber-criminal syndicates are ahead of the game, finding new sophisticated ways to gain access to an organisations "crown jewels", often through their networks.
During this webinar Steve Durbin, Managing Director of ISF, will provide guidance on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity and will discuss the importance of strengthening network security to improve resilience against hackers.
BrightTALK will be broadcasting a live video-panel discussion, with three of the industry's leading thinkers assembled to navigate the murky waters of the global cybercrime landscape.
-> Steve Durbin, Managing Director, Information Security Forum (ISF)
-> Richard Turner, President EMEA, FireEye
-> James Chappell, Co-Founder & CTO, Digital Shadows
-> Dan Raywood (moderator), Editor, Infosecurity Magazine
The panelists will be discussing why and how breaches keep occurring and growing; how cyber criminals seem to be acting with impunity and what's to be done about it.
Insights to take from the session:
> Who the 'bad guys' are and what drives them to commit cyber crime
> How they're succeeding and avoiding punishment
> How can you better protect yourself and your business from cyber crime
The panelists will also be available for 20 minutes of audience Q&A at the end, feel free to come prepared with your questions.
We look forward to you joining at the debate!