We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.
Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.
Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
-Why they use a layered approach to security and how OpenDNS complements their security stack
-How long it took to deploy OpenDNS Umbrella globally
-How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
Interview with FortyCloud during InfoSec 2014, the interview talks about the main challenges of IT security in 2014 and where are the best places to start dealing with those challenges.Read more >
In Westeros - the land of dark knights, backstabbing royals, and a myriad of other characters - even the youngest ones have to learn basic self-defense to have any hope of surviving the cruel world imagined by A Game of Thrones (GOT) author, George R. R. Martin. And so too, must every CISO and security pro learn the latest information security best practices if they’re to survive today’s Internet threat landscape.
Intrigued? In this fun yet informative webinar, noble Corey Nachreiner, Director of Security Strategy and Research at WatchGuard Technologies, will explore the information security tips you could extract from the morbidly dark, yet inescapably addictive fantasy series. He’ll cover lessons such as:
· Depending on just “The Wall” for defense isn’t wise. The best defense has layers.
· Never ignore the warnings of ravens because they may contain hints of potential security breaches.
· Building a strong castle won’t prevent an attacker from tricking an untrained guard into opening your gates.
Join us. Advance your training and, much like a GOT warrior, learn how you should always stay vigilant.
With the concept of the traditional datacenter boundary blurring across hosting providers, cloud services and other areas of the new enterprise, discovery and protection of critical assets has emerged as a challenge to Infosec professionals in all industries. Join (ISC)2 and McAfee on August 14, 2014 at 1:00PM Eastern as we explore strategies and tactics for gaining the insights and counter-measures you need to ensure your farthest flung assets are meeting your security requirements, no matter where they may be.Read more >
For the second year in a row, a comprehensive survey was conducted with the 300,000 members of the LinkedIn Information Security Community on the state of cloud security. This year’s survey results delve into many issues including: Are attitudes towards perceived security risks changing? Are organizations migrating to the cloud at the pace they suspected they would? How are technologies helping or hindering cloud adoption?... and more.
Join Holger Schulze, Founder of the LinkedIn Information Security Community, Ram Krishnan, Chief Product Officer at CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to:
• Learn how your peers’ strategies for securing cloud infrastructure have evolved in the last year
• Gain valuable insights on how your organization compares to others in the industry
• Find out what the top trends and priorities are for cloud security in 2016 and beyond
Threat and adversarial information has become easily accessible and gone mainstream in the last couple of years. However managing the threat lifecycle, can still be challenging for organizations continuously under pressure for the next attack and low on resources. Prioritizing threats, managing incidents and neutralizing the attackers successfully requires dedicated tools, processes as well as broad adoption by the IT Security staff. Join (ISC)2 and Intel Security at 1:00PM on March 19, 2015 as we discuss leveraging SIEM and effective means for improving your discovery and responses to today's emerging threats.Read more >
With the US and other nations on high alert for anyone running a fever (AKA: "presenting symptoms"), many healthcare facilities are merging electronic health record (EHR) systems with travel history, looking to "flag" patients who might be at risk.
- How does this information impact medical personnel workflow?
- How is the "mashup" of this information impacting privacy and security concerns?
- Should this information be shared if collected (and with whom)?
- Are these travel and EHR systems up to the task?
Join (ISC)² and several healthcare infosecurity practitioners on February 5, 2015 at 1:00pm as we discuss this hot button topic.
InfoSec Magazine Interview - Brian Maccaba
The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk.
We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices.
Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!
Join Chris Merritt, Director of Solution Marketing at Lumension, in this interactive, 30 minute discussion to learn:
• Your peers’ big concerns on BYOD and mobile security
• What they are currently doing to combat mobile device risk
• What solutions & security policies work in organizations
We look forward to hearing your thoughts and hope to see you there!
Why does a charity need security? What do they have to protect? Who would want to attack them? How do they protect themselves? What resources do they have? What else can they do?Read more >
Infosecurity Magazine Interview - Katie Moussouris, Chief Policy Officer, HackerOne filmed at RSA Conference 2016Read more >
This discusses the history of cyber warfare, current trends, and what is coming in the near future.Read more >
- How to extend your IAM infrastructure to support Cloud based apps
- The check list you need to get started
- How to provide web single sign-on and API security for customers, partners, and employees
Regulatory compliance is an ever-increasing presence impacting how organizations do business. These regulations are designed to compel organizations to effectively manage threats and information risk and require a concrete method for protecting information assets. Having a solid, measurable information security program enables organizations to meet compliance requirements. As a result, mature companies employ a minimum set of security standards and requirements mapped through industry-recognized frameworks and benchmark against applicable laws and regulations.
Join this webinar and walk away with a proven method for effectively managing threats and information risk.