Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
Josh Downs. BrightTALK's Information Security Community Manager breaks down the 5 webinars to attend (see attachments) at January's The Next Generation of Information Security Summit:
5 - Big Daddy Loves Big Data - Richard Hollis, Risk Factory
4 - Risk-based Security: Having the Right Security in the Right Place - Illyas Kooliyankal, ADS Securities
3 - Achieving Digital Trust: The Final Frontier - Jeffrey Ritter, The Ritter Academy
2 - Have Cyber Security Professionals Lost Their Touch? - Jitender Arora
1 - Best Practices for Uncovering Deeply Hidden Threats - Eyal Gruner, Cynet
To attend any of the above, see the URLs in the attachments.
For more insights, follow Josh on @downsy1990.
Shan Lee is the Head of Information Security at JUST EAT Plc where he is passionate about promoting a "Security Culture" in what is a fast moving and rapidly expanding, multinational environment.
In this presentation he will touch upon the following subjects: security culture, awareness, education, and the problems around the real threat being the (non-malicious) employees that don't even realise their online behaviour is a problem.
Faced with a complex, heterogeneous IT infrastructure and a “cloud first” directive from the board, Nick Bleech, Head of Information Security at building supplies giant Travis Perkins, used Splunk Enterprise Security running on Splunk Cloud to deliver enhanced security for 27,000 employees. The Splunk solution allowed Travis Perkins to provide real-time security monitoring, faster incident resolution and improved data governance while delivering demonstrable business value to the board.
Watch this webinar to hear Nick Bleech discuss:
• The business and security drivers tied to the deployment of a cloud-based SIEM (security incident and event management solution)
• The overall benefits of the Splunk solution
• The project’s critical success factors
• How stakeholders and the overall project were managed
• The positive impact of the deployment on the IT operations and IT security teams
• The next steps in the development of a lightweight security operations center
As management is increasingly involved in information security budgets, many questions are being asked – Did we really need to spend this money or could we have done without it? Are we really more secure now than before? Would we be more secure if we installed this product or spent money on security training?
In this presentation, MEEZA’s Information Security team will talk about a 3-step process which is a pragmatic view of the different components of an effective Security Risk based approach which provides perspective to a given organisation.
The MEEZA Information Security team will provide pointers on how to effectively present a Risk-based Security Plan to executives by highlighting some of the benefits which are considered ironies from a risk-based perspective
Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.
However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.
In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:
• Understanding the difference between strategic, operational, tactical and technical threat intelligence
• Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
• Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence
This presentation will examine some notorious attacks, explore factors that lead to successful attacks, and discuss significant issues and circumstances that lead to successful breaches.Read more >
Josh Downs, BrightTALK's Information Security Community Manager breaks down 3 must-watch webinars from February's Data-driven Security Summit:
3. Business-lead and Threat-Focused Cyber Risk Management - Chris Verdonck, Global Cyber Strategy & Peter Wirnsperger, Cyber Risk Services, Deloitte
2. Making Vulnerability Management Sexy, Again! - Amar Singh, Chair of ISACA's UK Security Advisory Group
1. (mis)Adventures in Data-driven Security: How to Avoid Tragedy & Engineer Success - Nik Whitfield, CEO, Panaseer
To attend any of the above, see the URLs in the attachments.
For more insights, follow Josh on @BrightTALK_Josh
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
We caught up with Daniele Catteddu for his thoughts on the world of information security - here's a brief snippet. Full interview to follow.Read more >
It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”
Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
· Humorous security tales and repercussions of employee behaviors
· Tips to deal with employees, execs and board members
· Security technology recommendations that work best across a security stack
Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.
Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might look like for the world of information security.Read more >
Information Security Officer of a global law firm looks at the three main reasons the legal sector should consider Managed Security ServicesRead more >
Information Security Officer of a global law firm looks at the effect of cyber attacks on the legal sectorRead more >
Information Security Officer of a global law firm looks at managing IT in the legal sector.Read more >