According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.
Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.
Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
To stay ahead of attackers, IT security teams are connecting their sophisticated threat mitigation infrastructure to a wide range of threat intelligence services: their own network data, open-source intel, commercial feeds, and even peers threat intel. Consuming this data is a starting point, but in many cases the volume of information generated is overwhelming. Its increasingly clear that threat intelligence needs to be winnowed down to the essential critical events, and then have context added to those events to reach the ultimate goal: to turn a mountain of threat intelligence into a few meaningful actions.
This webinar covers the challenges associated with working with threat intelligence and the security solutions available to turn data into actions that meaningfully decrease the threat exposure window.
As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.
This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.
Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people to help them understand how threat detection works. Having the best firewall and antivirus in the world will not keep you safe from cyber attacks. Attend this webinar to see why advanced monitoring is the only way to ensure vigilant cybersecurity.Read more >
Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.Read more >
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
Cloud Cybersecurity Lessons From 1B Files and 10M Users
Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?
Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.
Join this webinar to see where your organization stands against your peers and competitors.
The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.
In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.
Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.
Learn how your organization must demand solutions that enable you to:
• Take measures to secure data
• Effectively track incidents and remediate incidents
• Report out on compliance status
There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.
As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?
Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:
-How investors assess cybersecurity in the M&A diligence process
-What institutional shareholders want to know about cyber risks to their investments
-How shareholders can meaningfully engage with companies on cybersecurity
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.Read more >
Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.Read more >
Although cyber attacks are on the rise, cybersecurity in state and local governments around the country often remain woefully underfunded. In an era of limited budgets and competing priorities, the behind-the-scenes risk mitigation of cybersecurity can be underappreciated and pushed down the list.
This digital viewcast will explore some of the biggest cyber challenges facing state and local governments such as outdated IT systems, the rise of IoT, budgetary constraints and hiring the correct workforce, while also examining how to effectively communicate cyber risks to both internal and external stakeholders. Route Fifty will sit down with cyber experts to discuss the following essential elements of a successful cybersecurity program:
- Implementing the strategy: Defining the correct priorities, tools, and tactics
- Training the workforce: Communicating best practices in cybersecurity to employees across an organization
- Transforming the culture: Instilling the importance of cybersecurity beyond just the office of information technology
- Developing the partnerships: Working across both different agencies and different levels of government and collaborating with the private sector
- Making the case: Effectively securing cybersecurity funding from skeptical stakeholders
On November 8th, the citizens of the United States will elect their next President, who will be facing a variety of cybersecurity issues that he or she will need to address.
On November 7th at 11 AM PT, a panel of former senior government officials will come together to discuss these cybersecurity issues that the next President will be facing.
Moderator: Ely Kahn, Co-Founder of Sqrrl and former Director of Cybersecurity at the National Security Council, White House
- Adam Isles - Principal at The Chertoff Group and former Director of International Economic Affairs at the National Security Council, White House
- Rob Knake - Senior Advisor at Context Relevant and former Director of Cybersecurity at the National Security Council, White House
- Paul Kurtz - Co-Founder and CEO of TruStar and former Special Assistant to the President for Critical Infrastructure Protection at the National Security Council, White House
- Jacob Olcott - Vice President Business Development at BitSight and former Counsel at the US Senate
Michael Daniel is the Special Assistant to the President and Cybersecurity Coordinator to the White House. Daniel leads the development of national and international cybersecurity strategy and policy and oversees implementation of those policies; ensuring that the federal government is effectively partnering with the private sector, non - governmental organizations and other branches and levels of government, and nations. He will discuss the current state of cybersecurity and share valuable insights and predictions.Read more >
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.
Topics covered will include:
-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
-Its use in both Regulated and Non-Regulated
Cyberattacks are on the rise, with increasingly sophisticated and persistent cyber threats promoting the Obama administration to issue the Cybersecurity Strategy and Implementation Plan (CSIP) and Cybersecurity National Action Plan (CNAP) to enhance cybersecurity capabilities within the federal government and across the country.
As agencies work to implement these plans, issues such as outdated infrastructure systems, inconsistent capabilities, and inadequate resources hinder their efforts to detect, prevent, and recover from cyber attacks. In this webcast, we will explore the power of big data and analytics to overcome these challenges and talk with experts about leveraging existing infrastructure with an integrated cyber analytics approach to help government agencies:
•Detect the overall exposure
•Predict and prevent cyber attacks
•Improve cyber defense
•Automate threat indicator sharing
Over the past year, a spotlight has been cast on the federal government's insecure,often outdated, digital infrastructure and activities underway to identify and tackle threats to high-value content. What is the current state of security in federal government and how are agencies across government protecting their most prized data?
At this event, Nextgov will sit down with experts to discuss how cybersecurity has changed the wake of recent breaches of federal IT systems as well as the various policy responses to these breaches and how they are being implemented at an agency level. We'll take a look at federal cybersecurity spending, the new layers of cyber defense through data protection, and how agencies have used the Cybersecurity Strategy and Implementation Plan to improve their systems against hackers and other cyber threats.
In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?
Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:
- Why cybersecurity benchmarking is difficult for the modern CIO.
- Different methods of benchmarking you may be involved in (or want to consider).
- How Security Ratings may solve many benchmarking challenges.
Cybersecurity threats are evolving more quickly than most organizations can pivot to defend against them. The 2016 IDC report states that “worldwide spending on cybersecurity products and services [is expected] to eclipse $1 trillion for the five-year period from 2017 to 2021” but we still may not be combatting emerging threats in the right ways.
While we’re battling against growing threats from conventional computers, quantum computers are a growing shadow on the threat landscape, and people are already starting to think about how to get ready. Quantum safe options are becoming available, and bring with them new ways of thinking about how to integrate security solutions based on fundamentally different problems. What happens to TLS? What happens to VPN? What happens to PKI? Is your business ready? What potential threats should you be evaluating in your security strategy for 2017?
In this talk, we’ll cover the 360-degree view of becoming quantum resistant. What is a quantum computer? Why will it cause problems for your security systems? How do you use quantum safe security?! How does entering the quantum age impact common tools like TLS, VPN, and PKI, and what are the challenges they’ll face? And most importantly, when do you need to worry?
No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.
Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:
•Implications of breach impacts for organizations
•Benefits of a risk management strategies
•Current trends in information-security threats
Register for this webinar today!
Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.
During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.
An audience Q&A will follow the technical presentations.