Sean Sullivan, Security Advisor and researcher at F-Secure, discusses how the Internet of Things (IoT) exposes consumers to potential cybercrime, which industries are most susceptible to cyber attacks, the percentage of companies that are confident in their cyber security measures, and predictions for the cyber security industry.Read more >
Learn more about how IoT is posing new cyber threats, how Fortune 500 companies are integrating cyber security into their firm, biggest threats & opportunities, and more with Stew Wolfe, Associate Principal, Cisco Global Security, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs.Read more >
2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.
This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams
- Amar Singh, Cyber Management Alliance
- Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
- Edward Tucker, CIO, DP Governance
- Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
New cyber risks and threats are emerging at a pace faster than ever before.
- How are cyber risks evolving
- Which risks can be managed through cyber insurance?
We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy. Cyber risk can’t be eliminated – it must be managed.
This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.
About the Speaker:
Susan Young is a Senior Vice President and advisor with Marsh’s
national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet. Building resilience in critical infrastructure is crucial to our national security. Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure. It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.Read more >
Cybersecurity isn't just about detecting and responding to threats; it's also about understanding an organization's risk. In an age of high-profile cyber attacks, it's becoming increasingly important to have a strategy and process for accessing risks and their potential impact on your business.
Join top industry experts and executives for an interactive Q&A session to learn more about:
- How to evaluate your cyber risk
- Recent NIST CSF risk assessment update
- Staying on top of the latest threats and protecting the critical assets those threats can impact
- Cyber risk insurance
- Recommendations for improving security and minimizing your risk
The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Why breach prevention matters
- True costs of breaches
- Technological solutions to consider for a more cyber resilient enterprise
- How AI/machine learning and human talent can work together
- Top threats to look out for in 2018
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Simon Moor, VP for Northern Europe, FireEye
- Bob Honour, EMEA Marketing Director, SonicWall
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.
Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?
Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.
In this webinar, you will learn:
•How AI will enhance the sophistication of cyber-threats
•Why organizations should prepare for AI-based attacks
•How cyber security companies are responding to advances in AI
•How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense
Cyber Thursday is a regular monthly broadcast video which provides an update on the latest development in the field of Cyber Security. Every second Thursday of the month the programme will feature a number of contributors and panellists from both within Palo Alto Networks and third party thought leaders from the Security Industry.
This first edition will focus on Next Generation EndPoint Security Solutions and the challenges that organisations face when a breach occurs. Among the things we will discuss are:
- what we mean by endpoint
- how come attacks go through despite all measures
- what happens after a breach
- what are the big challenges in endpoint protection and any specific to EMEA
- what are the changes coming up
- the big threat of ransomware
The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.
Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.
Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.
What you will learn from this webinar:
- How to prioritize what is most important when an attack happens.
- Visibility into your attack surface and how to validate what the exposure is.
- How to establish a metric based risk management program.
About the Presenter:
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
We know the Board has a key role to play in supporting better cyber-security but with so many pressing and competing issues, how can we raise cyber security up the Board’s agenda?
Richard Holmes, VP Secure Systems Engineering, and Gianni Rino, Global Industry Lead for Retail and Consumer Services at CGI UK, will share their insights, expertise and learning on cyber-security and Board engagement:
•What is the role of the Board in supporting better cyber-security?
•How to cost and communicate cyber risks to Board members
•CGI’s eight boardroom recommendations
Asia Pacific has recently seen numerous changes to legislation and regulations as governments attempt to come to grips with the risks posed by cyber security breaches. In particular, the strengthening of data privacy laws which are increasingly requiring organizations to disclose, within a short time-frame, when they become aware that personally identifiable information belonging to customers or employees has been exposed. The associated heavy penalties are driving more and more companies to take proactive measures. Then there are the regulators (notably in the financial world) who are driving requirements for self-testing of cyber security with a focus on the ability to quickly recover from and remediate a cyber incident. Join Paul Jackson as he discusses the latest development of the privacy and cyber security field in Asia, and the best approach to mitigate these risks.Read more >
While cyber threats are exponentially increasing in volume, diversity and sophistication, they are rapidly outstripping our ability to safeguard critical data, applications and systems. Join this webinar to hear SA Morgan explain how the FBI addresses the cyber threat, discuss the cyber threat landscape in K-12, and provide prevention and mitigation techniques that you can implement on your campus.Read more >
You probably spend enough on cyber security. Leadership and analysis can achieve more than additional spending.
Technology and services will continue to improve and evolve, but the total spend by companies does not need to grow to counter new threats. Damrod provides an analytical toolkit based on military principles to understand, assess, and defend against cyber-attack.
This presentation focuses on treating cyber as conflict and countering an attacker through better tactics to achieve a better defense.
About the Speaker:
Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.
Every enterprise has a pre-built enterprise cyber defence arm; their employees. Enterprises are only now starting to recognise the potential cyber defence value employees offer. Harnessing and educating this currently untapped resource will change the face of enterprise cyber defence – putting responsibility on the front line, minus the blame culture.
This webinar will highlight where and how your employees can add significant value to your Enterprise cyber defence in-depth strategy.
When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.
The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.
In this live webinar, learn the four requirements of complete endpoint data protection:
1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
3. Total Encryption - Protect data in-flight and at rest
4. Beyond Backup Features - Remote wipe, Legal hold
According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.Read more >