This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.Read more >
Sean Sullivan, Security Advisor and researcher at F-Secure, discusses how the Internet of Things (IoT) exposes consumers to potential cybercrime, which industries are most susceptible to cyber attacks, the percentage of companies that are confident in their cyber security measures, and predictions for the cyber security industry.Read more >
Find out how the government is tackling cyber threats, legislation for cyber security, gender diversity in STEM, cybercrime predictions and more with Robert Hudyma, Professor at Ryerson University in the Ted Rogers School of Management, and Raj Lala, President & CEO of Evolve ETFs.Read more >
Learn more about how IoT is posing new cyber threats, how Fortune 500 companies are integrating cyber security into their firm, biggest threats & opportunities, and more with Stew Wolfe, Associate Principal, Cisco Global Security, and Raj Lala, President & CEO of Evolve ETFs.Read more >
2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.
This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams
- Amar Singh, Cyber Management Alliance
- Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
- Edward Tucker, CIO, DP Governance
- Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
New cyber risks and threats are emerging at a pace faster than ever before.
- How are cyber risks evolving
- Which risks can be managed through cyber insurance?
We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy. Cyber risk can’t be eliminated – it must be managed.
This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.
About the Speaker:
Susan Young is a Senior Vice President and advisor with Marsh’s
national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
In the highly dynamic online landscape of misinformation, fake news, gossip, and the trading of absconded data, organizations must expand their cybersecurity arsenals in protecting their brands, personnel, facilities, and sensitive information. They must take into account what exists outside the perimeter in the greater cyber ecosystem: the surface, dark, and deep web. Locating and assessing these threats, however, is a challenge for even experienced threat hunters. The tools and techniques are non-standard. You should ask yourself, “Is my security team ready to tackle what lies beyond the perimeter?” If not, let us shed light on this topic. Register for LookingGlass' "Threats Beyond the Perimeter" webinar on Tuesday, July 17 @ 2 pm ET to hear Michael Suby, VP of Research at Frost & Sullivan and James Carnall, VP of Customer Support Group at LookingGlass discuss how these scenarios may affect your brand, employees, and facilities.Read more >
The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet. Building resilience in critical infrastructure is crucial to our national security. Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure. It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.Read more >
Cybersecurity isn't just about detecting and responding to threats; it's also about understanding an organization's risk. In an age of high-profile cyber attacks, it's becoming increasingly important to have a strategy and process for assessing risks and their potential impact on your business.
Join top industry experts and executives for an interactive Q&A session to learn more about:
- How to evaluate your cyber risk
- Recent NIST CSF risk assessment update
- Staying on top of the latest threats and protecting the critical assets those threats can impact
- Cyber risk insurance
- Recommendations for improving security and minimizing your risk
The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Why breach prevention matters
- True costs of breaches
- Technological solutions to consider for a more cyber resilient enterprise
- How AI/machine learning and human talent can work together
- Top threats to look out for in 2018
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Simon Moor, VP for Northern Europe, FireEye
- Bob Honour, EMEA Marketing Director, SonicWall
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.
Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?
Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.
In this webinar, you will learn:
•How AI will enhance the sophistication of cyber-threats
•Why organizations should prepare for AI-based attacks
•How cyber security companies are responding to advances in AI
•How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense
Welcome to the NMG Media podcast series where we help bridge the communication gap between carriers and suppliers in the ICT sector. Today, we are joined by a leader in the cybersecurity sector, Jacqui McNamara, Head of Cyber Security Services at Telstra. Jacqui is a also former intelligence officer with the ADF and served for many years in different commands, including the G6 and Special Operations. We also welcome Mayukh Gon, a serial entrepreneur and the founder of PerfectCloud, a unified Cyber security company that focuses on Privacy and Security.Read more >
Cyber Thursday is a regular monthly broadcast video which provides an update on the latest development in the field of Cyber Security. Every second Thursday of the month the programme will feature a number of contributors and panellists from both within Palo Alto Networks and third party thought leaders from the Security Industry.
This first edition will focus on Next Generation EndPoint Security Solutions and the challenges that organisations face when a breach occurs. Among the things we will discuss are:
- what we mean by endpoint
- how come attacks go through despite all measures
- what happens after a breach
- what are the big challenges in endpoint protection and any specific to EMEA
- what are the changes coming up
- the big threat of ransomware
A BrightTalk Webinar aimed at mid-tier corporates, Family Offices and private clients. Of particular interest to CEOs, CIOs, CTOs and GRC functions.
The webinar will discuss: the unique nature of the threat to mid-tier corporates and Family Offices; why you should be aware not alarmed; assessing your current cyber maturity; building strength in depth; the importance of leadership.
The webinar will enable those who currently see a threat they don’t understand and are alarmed by, to begin to take concrete steps to address it.
Malcolm Taylor is the Director of Cyber Security at ITC Secure, the London-based, leading MSSP and Cyber Security Consultancy company. Malcolm is a recognised expert in strategic cyber security, built upon a 20+ year career at GCHQ and in the private sector.
Any firm that has avoided attacks due to social engineering, distributed denial of service, ransomware, evasive malware and e-mail interception can count themselves lucky...but this is the year that may be changing. Cyber criminals have stepped up their game altering the threat landscape for CPA's now and in the years ahead. More than ever, accounting professionals need to keep up to date on the latest threats and adjust their game plan accordingly. This webinar will review the current threat landscape for CPA's, as well as the actions that small to mid-size firms should be taking to mitigate risk on limited budgets.
Presented by Eric Hess - Eric Hess founded HLC LLC in 2014 to focus on systems compliance and information security consulting. Today, it provides an array of right sized cybersecurity assessment and cybersecurity management services to small to medium sized businesses. HLC’s clients are primarily financial services firms, but HLC is developing a focus on CPA firms and law firms.
It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?
Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.
- Griff James, Director at Damrod Analysis
- Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
- Will Lymer, Chief Growth Officer at Loki Labs
This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).
Discover the basic cyber hygiene practices your organization should have in place to drastically reduce your risk exposure.
Join well-known CISOs at the top of their game for an interactive discussion on:
- How to achieve basic cyber hygiene
- Best practices for minimizing your cyber risk
- Cybersecurity awareness & employee training
- Ethical hacking
- Cyber insurance
According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.
Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.
You will learn about:
- The ever-changing threat landscape, and how it affects your business
- Key Considerations for your Cyber Security Strategy
- Insight into real-life case studies
The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.
Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.
Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.
What you will learn from this webinar:
- How to prioritize what is most important when an attack happens.
- Visibility into your attack surface and how to validate what the exposure is.
- How to establish a metric based risk management program.
About the Presenter:
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
We know the Board has a key role to play in supporting better cyber-security but with so many pressing and competing issues, how can we raise cyber security up the Board’s agenda?
Richard Holmes, VP Secure Systems Engineering, and Gianni Rino, Global Industry Lead for Retail and Consumer Services at CGI UK, will share their insights, expertise and learning on cyber-security and Board engagement:
•What is the role of the Board in supporting better cyber-security?
•How to cost and communicate cyber risks to Board members
•CGI’s eight boardroom recommendations
Asia Pacific has recently seen numerous changes to legislation and regulations as governments attempt to come to grips with the risks posed by cyber security breaches. In particular, the strengthening of data privacy laws which are increasingly requiring organizations to disclose, within a short time-frame, when they become aware that personally identifiable information belonging to customers or employees has been exposed. The associated heavy penalties are driving more and more companies to take proactive measures. Then there are the regulators (notably in the financial world) who are driving requirements for self-testing of cyber security with a focus on the ability to quickly recover from and remediate a cyber incident. Join Paul Jackson as he discusses the latest development of the privacy and cyber security field in Asia, and the best approach to mitigate these risks.Read more >