In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?
Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.
Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
See Richard Hollis in action as he delivers an informative brief of the essential elements needed in designing an effective information security awareness program for your business.
The session covers the four pathways that need to be taken and includes the way to identify the KPIs required to actually measure the success of the program and verify the real change in your business culture.
Josh Downs. BrightTALK's Information Security Community Manager breaks down the 5 webinars to attend (see attachments) at January's The Next Generation of Information Security Summit:
5 - Big Daddy Loves Big Data - Richard Hollis, Risk Factory
4 - Risk-based Security: Having the Right Security in the Right Place - Illyas Kooliyankal, ADS Securities
3 - Achieving Digital Trust: The Final Frontier - Jeffrey Ritter, The Ritter Academy
2 - Have Cyber Security Professionals Lost Their Touch? - Jitender Arora
1 - Best Practices for Uncovering Deeply Hidden Threats - Eyal Gruner, Cynet
To attend any of the above, see the URLs in the attachments.
For more insights, follow Josh on @downsy1990.
Shan Lee is the Head of Information Security at JUST EAT Plc where he is passionate about promoting a "Security Culture" in what is a fast moving and rapidly expanding, multinational environment.
In this presentation he will touch upon the following subjects: security culture, awareness, education, and the problems around the real threat being the (non-malicious) employees that don't even realise their online behaviour is a problem.
Faced with a complex, heterogeneous IT infrastructure and a “cloud first” directive from the board, Nick Bleech, Head of Information Security at building supplies giant Travis Perkins, used Splunk Enterprise Security running on Splunk Cloud to deliver enhanced security for 27,000 employees. The Splunk solution allowed Travis Perkins to provide real-time security monitoring, faster incident resolution and improved data governance while delivering demonstrable business value to the board.
Watch this webinar to hear Nick Bleech discuss:
• The business and security drivers tied to the deployment of a cloud-based SIEM (security incident and event management solution)
• The overall benefits of the Splunk solution
• The project’s critical success factors
• How stakeholders and the overall project were managed
• The positive impact of the deployment on the IT operations and IT security teams
• The next steps in the development of a lightweight security operations center
As management is increasingly involved in information security budgets, many questions are being asked – Did we really need to spend this money or could we have done without it? Are we really more secure now than before? Would we be more secure if we installed this product or spent money on security training?
In this presentation, MEEZA’s Information Security team will talk about a 3-step process which is a pragmatic view of the different components of an effective Security Risk based approach which provides perspective to a given organisation.
The MEEZA Information Security team will provide pointers on how to effectively present a Risk-based Security Plan to executives by highlighting some of the benefits which are considered ironies from a risk-based perspective
When it comes to building a security program, focusing only on technology and processes puts organizations in a weak and unbalanced position. People need to be equally factored in—and that’s where culture comes in. Listen as Bo talks about the importance of a strong security culture and walks through four essential components needed to build one.Read more >
Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.
However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.
In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:
• Understanding the difference between strategic, operational, tactical and technical threat intelligence
• Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
• Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.
Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:
• Security KPIs with risky validation processes (far more common than you think)
• A checklist of security points that need tight inspection (and where to drill down)
• New security services that streamline the process
This presentation will examine some notorious attacks, explore factors that lead to successful attacks, and discuss significant issues and circumstances that lead to successful breaches.Read more >
Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:
3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte
2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group
1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer
To attend any of the above, see the URLs in the attachments.
For more insights, follow Josh on @BrightTALK_Josh
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:
- 5 key architectural requirements your cloud security strategy can’t live without.
- What core building blocks you need to enable and secure your users and apps
- Learn how leading enterprises are transforming their security to cloud
Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.
At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.
For more questions about Zscaler, go to www.zscaler.com
We caught up with Daniele Catteddu for his thoughts on the world of information security - here's a brief snippet. Full interview to follow.Read more >