This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.Read more >
Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.
This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.
Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:
• Security risks across the complete cyber attack lifecycle, not only detection and response
• A simple and proven method for approaching the risk reality facing all organizations
• The rising cyber security insurance market and how it will affect risk management efforts
• Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
• Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
• Best practice exercises to test your incident response plan based on real-world experiences
• Techniques for effectively reporting risk and capability needs to a Board-level audience
With new attack methods emerging every day, organizations are faced with the challenge of defending their systems against never-before-seen, machine-speed threats produced by an ever-evolving adversary. Moreover, insiders bring another layer of uncertainty to every organization – so how do security teams catch what’s lurking within their own networks?
Darktrace’s cyber AI technology offers the only approach capable of detecting and autonomously responding to subtle, stealthy threats across the entire digital infrastructure.
Join Darktrace’s Director of Enterprise Cyber Security, Dave Masson, to hear about the latest threats that Darktrace AI has neutralized, including:
•A sophisticated attacker exfiltrating data via an internet-connected locker
•A novel form of malware spreading laterally within the network
•A widespread, insider-run bitcoin operation at a Fortune 500 company
Having world class cyber security is a luxury many medium sized enterprises cannot afford. Added to this, the battle to attract and retain suitable technical staff poses a huge challenge to the security and compliance posture of the bulk of mid-market companies in western economies.
August 9th - 3pm GMT / 4pm CET / 11am EST / 10am CNT / 8am PST
At this webinar you will learn:
•The importance of changing everyday behaviour in the face of evolving and sophisticated cyber threats
•Key questions you should ask your information technology management
•Why Executives and the Board of Directors should bear the ultimate responsibility for the creation of a modern cyber ready organisation
•How to build cyber security into your digital transformation exercise
Sean Sullivan, Security Advisor and researcher at F-Secure, discusses how the Internet of Things (IoT) exposes consumers to potential cybercrime, which industries are most susceptible to cyber attacks, the percentage of companies that are confident in their cyber security measures, and predictions for the cyber security industry.Read more >
Learn more about how IoT is posing new cyber threats, how Fortune 500 companies are integrating cyber security into their firm, biggest threats & opportunities, and more with Stew Wolfe, Associate Principal, Cisco Global Security, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs.Read more >
D3 Security and EMA Present: How to Prepare Your SOC for Security Orchestration.
Sophisticated cyber attacks and a siloed IT ecosystem have prompted the rise of Security Orchestration, Automation and Response technology. To keep up with the threat landscape, security professionals and architects must understand how to prepare for and deploy "SOAR".
In this webinar hosted by EMA Security and Risk Management Expert, David Monahan, and D3 Director of Cyber Security, Stan Engelbrecht learn how to:
• Define expectations for security and IR orchestration
• Map your tools, processes and stakeholders
• Prioritize compliance and business requirements
• Automate a full-lifecycle Phishing / BEC playbook
We'll also do a deep-dive on the latest automation and orchestration capabilities, including threat intelligence enrichment, artificial intelligence (AI) and machine learning (ML), and share insight from real-world SOAR deployments and security operations.
2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.
This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams
- Amar Singh, Cyber Management Alliance
- Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
- Edward Tucker, CIO, DP Governance
- Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
New cyber risks and threats are emerging at a pace faster than ever before.
- How are cyber risks evolving
- Which risks can be managed through cyber insurance?
We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy. Cyber risk can’t be eliminated – it must be managed.
This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.
About the Speaker:
Susan Young is a Senior Vice President and advisor with Marsh’s
national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
It’s 2018 and threat actors continue to leverage the same tactics – phishing, ransomware, botnets, etc. – against their targets. They’ve using the same techniques for years, yet it’s still working. Do we sound like a broken record yet?
With October being National Cyber Security Awareness Month, it’s an ideal time to re-evaluate the cyber threat landscape and your cybersecurity hygiene. Topics like fake news, privacy, and the Internet of Things are “hot” topics in mainstream culture, and you need to know their impacts on your organization.
Join LookingGlass’ Senior Vice President of Product, Eric Olson, and Vice President of Customer Support, James Carnall, in a lively discussion about the hottest cybersecurity topics and what your organization can do to protect itself against them. Wednesday, October 24 @ 2PM ET.
This webinar will also cover:
· Business Email Compromise (BEC)
· Single Sign-On and Password Managers
· Information Warfare
· Third Party Risk
In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.Read more >
The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet. Building resilience in critical infrastructure is crucial to our national security. Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure. It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.Read more >
Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.
During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).
Discover the basic cyber hygiene practices your organization should have in place to drastically reduce your risk exposure.
Join well-known CISOs at the top of their game for an interactive discussion on:
- How to achieve basic cyber hygiene
- Best practices for minimizing your cyber risk
- Cybersecurity awareness & employee training
- Ethical hacking
- Cyber insurance
- Gary Hayslip, CISO, Webroot
- Joseph Kucic, CSO, Cavirin Systems
- Dan Lohrmann, Chief Strategist & CSO, Security Mentor
How prepared are you and your organization to respond to a data breach?
Executives and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise.
Ropes & Gray and Mandiant have joined forces to help you evaluate your organization’s ability to respond effectively to a cyber incident before it occurs. The Tabletop Exercise uses gameplay techniques to assess your cyber crisis processes, tools and proficiency from legal, governance and technical perspectives. During the exercise, multiple scenarios based on real-world experience are simulated in a roundtable environment, allowing Ropes & Gray to provide concrete legal advice to your organization based on the results, including advice on potential enhancements to your organization’s cyber breach and incident response preparedness that Mandiant and Ropes & Gray identify through the exercise.
About Ropes & Gray
Ropes & Gray privacy & cybersecurity attorneys have advised and assisted clients in responding to cyberincidents of multiple shapes and sizes, including many of the largest incidents in history, and apply that extensive background to counsel clients on cybersecurity incident preparedness.
Mandiant, a FireEye company, has over 14 years of near-daily interaction with organized, persistent attackers and threat groups around the world. Mandiant consultants spend hundreds of thousands of hours annually working with organizations of all sizes to remediate security breaches, identify vulnerabilities and provide guidance on closing security gaps.
Cybersecurity isn't just about detecting and responding to threats; it's also about understanding an organization's risk. In an age of high-profile cyber attacks, it's becoming increasingly important to have a strategy and process for assessing risks and their potential impact on your business.
Join top industry experts and executives for an interactive Q&A session to learn more about:
- How to evaluate your cyber risk
- Recent NIST CSF risk assessment update
- Staying on top of the latest threats and protecting the critical assets those threats can impact
- Cyber risk insurance
- Recommendations for improving security and minimizing your risk
The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Why breach prevention matters
- True costs of breaches
- Technological solutions to consider for a more cyber resilient enterprise
- How AI/machine learning and human talent can work together
- Top threats to look out for in 2018
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Simon Moor, VP for Northern Europe, FireEye
- Bob Honour, EMEA Marketing Director, SonicWall
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.
Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?
Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.
In this webinar, you will learn:
•How AI will enhance the sophistication of cyber-threats
•Why organizations should prepare for AI-based attacks
•How cyber security companies are responding to advances in AI
•How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense
Join this webcast to hear how you can mitigate the risk to existing threats, and learn how your organisation can protect itself against those on the horizon.
Rolf Von Rössing, ISACA
Ron Peeters, Managing Director EMEA, Synack
Stefan Hager, Cyber Security Engineer, DATEV
Welcome to the NMG Media podcast series where we help bridge the communication gap between carriers and suppliers in the ICT sector. Today, we are joined by a leader in the cybersecurity sector, Jacqui McNamara, Head of Cyber Security Services at Telstra. Jacqui is a also former intelligence officer with the ADF and served for many years in different commands, including the G6 and Special Operations. We also welcome Mayukh Gon, a serial entrepreneur and the founder of PerfectCloud, a unified Cyber security company that focuses on Privacy and Security.Read more >