Analysis shows that human actions are overwhelmingly at the heart of many data breaches, and cyber attackers are actively seeking to exploit this to compromise target systems.
If global organisations and nation states with their considerable resources and budgets are struggling to stem the flow of data breaches from this threat, what hope do ordinary businesses have of protecting themselves in 2019 and beyond?
Join us for a comprehensive and insightful webinar from Daryl Flack, CIO and Co-Founder of BLOCKPHISH, who will use examples drawn from real attacks to reveal why, if you invest in your staff, you can be more confident in your ability to be resilient to cyber-attacks.
Threats to your backup infrastructure continue to rise – the data that resides there and the applications it has access to are a prime target for a cyber-attack. At Carbonite, we’ve helped over 10,000 customers prevent or recover from cyber attacks in their many forms but even we are not immune to attacks.
Join our webinar and hear from our own head of cyber security, Jeannine Gaudreau, about tactics we use at Carbonite to prevent and recover from a cyber security event. We will also have a question and answer session where we discuss a few different case studies and how we’ve employed similar tactics to assist our customers.
What are the latest trends in the cyber-criminal underworld?
Which attacks are you likely to be preventing as we move further into 2018?
Who’s looking for vulnerability on your network?
These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
Chief Executive Officer, First Base Technologies LLP
Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.
Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.
Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.
What you will learn from this webinar:
- How to prioritize what is most important when an attack happens.
- Visibility into your attack surface and how to validate what the exposure is.
- How to establish a metric based risk management program.
About the Presenter:
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.
“Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.
Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:
•How to identify security maturity improvement areas before, during and after a breach
•Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
•What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
•Which key strategic communication tactics should be considered when reporting a breach
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
- Jeannie Warner, Security Manager, WhiteHat Security
- Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.
As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.
In this webinar you will learn:
• How cybercriminals are diversifying in order to remain profitable
• The new methods of threat propagation causing headaches for organizations
• The next generation of IoT threats
• Recent targeted attack campaigns
Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.
Reasons to attend:
Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.
Joining the webinar equips you with 3 essential skills for damage limitation:
Learn how to:
* Implement multi layered protection that offers
* Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
* Rollback to the point immediately before the attack
Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.
Join us for a discussion of:
- Just released research that outlines healthcare's most likely threat vectors of 2018
- How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
- Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
- New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.
During this webinar, our Vice President Stuart McKenzie will discuss:
- Longer-term trends in today's threat landscape
- Sophisticated and harmful APT groups to look out for
- Which organisations are most likely to be retargeted by attackers
- The difficulty of finding skilled personnel and how it affects the security function
- How weaknesses in security fundamentals contributed to successful compromises
- Best practice red teaming tactics for improved security defense
This session will dive deep into the skills and techniques mastered during Cyber Ranges such as preventing live attacks, responding to real-world threats, and building end-to-end prevention processes while battling other teams during full-on cyberattack scenarios.Read more >
Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.
This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.
Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:
• Security risks across the complete cyber attack lifecycle, not only detection and response
• A simple and proven method for approaching the risk reality facing all organizations
• The rising cyber security insurance market and how it will affect risk management efforts
• Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
• Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
• Best practice exercises to test your incident response plan based on real-world experiences
• Techniques for effectively reporting risk and capability needs to a Board-level audience
With the change in the data protection laws, in the UK, SME businesses must start to embrace the need for a cyber security strategy. No longer is “cyber security” an elitist term that fills the corridors and board rooms of large enterprises.
As part of BrightTALK's Data Breaches and Effective Response Summit, we will look to dispel this misconception and help SME business owners understand what they can do to begin to protect and help mitigate the risk of a Cyber Attack against them.
This webinar will cover the following topics:
- What are the fundamentals that SMEs should be putting in place
- Case Studies: Learning from previous data breaches
- Proportionately remediating against gaps in security
- Taking some practical steps to get you started
The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.
Join IoT and security experts to learn more about:
- Unique challenges of securing IoT systems
- IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
- Proactive security strategies to stave off the threat of IoT cyber attacks IoT
The spate of cyber-attacks continues with an increasing level of sophistication and precision and sometimes finding the easiest path – through the weakest link in the chain – the human factor. Businesses and even government organizations are constantly in an alarmed state having to deal with the aftermath of such attacks. Be it the case of City of Atlanta or the more recent SingHealth breach, it is evident that CIOs and CISOs across the globe need to re-assess their traditional security approach.
What is Browser Isolation? And how can this technology aid CISOs, security leaders & practitioners in managing cyber threats?
Register to watch Rajiv Raghunarayan, VP Products at Cyberinc outline a simple yet effective approach organizations - enterprise or government - could take towards reducing risk and vulnerabilities, while also driving up the productivity of their IT security teams.
Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:
- To save money on your current IT and security investments
- To ensure your third party is delivering the right level of security and service
- Increase your operational efficiency and lower total cost of operations.