Join our free webinar and hear from Mohammed Hussain, Sales Manager Technology Alliances at the multi-national IT security company Kaspersky Lab, about the newest IT security trends, changing threat landscape and importance of effective protection.
All live attendees of this webinar will get a free copy of Kaspersky Internet Security 2013 for your home PC or Kaspersky Mobile Security for your smartphone upon request.
The presentation will cover various topics around IT security, including:
- Malware evolution
- New trends and threats
- Don’t run the risk – cost of cybercrime
- Stand out from the crowd – effective anti-malware
Major events such as this summer’s UEFA Euro 2016 soccer tournament present special challenges for CSPs and end-users. The mobile traffic they generate boosts engagement but also poses increased risks to their online activity. Join Allot Communications and Kaspersky Lab to discuss the findings of the latest Allot MobileTrends Report, which has analyzed mobile internet users’ activity during UEFA Euro 2016 . Learn
•How big global events can influence users' online activity
•How and why are security threats intensified?
•What kind of behavior / usage increases security risks for users?
•Who is most vulnerable, and why?
•What measures can be taken to mitigate threats?
•What revenue-generating opportunities arise for CSPs from such major events?
SonicWALL will be launching the new SonicWALLÃÂÃÂ® Enforced Client Anti-Virus and Anti-Spyware - Kaspersky. The solution is easily deployed, automatically enforced and updated network-wide by SonicWALL firewalls on WindowsÃÂÃÂ® desktops and laptops, providing maximum protection with minimal overhead. Sign up for this introductory webinar, and be the first to know everything about this new solution.Read more >
The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware and malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable targets for malware authors. Malware is part of our daily life and is platform agnostic.
Attend this webinar to learn more about:
- Mobile risks at every layer in the three major mobile OS/platforms: Android, iOS and BlackBerry
- Key threats associated with your mobile and roaming workforce
- Security measures to prevent corporate data leakage and malware infection on devices
Please join, Kaspersky Lab Senior Security Strategist, Ryan Naraine, who will provide an in-depth look at the real-world risks associated with the deployment of mobile devices in the enterprise and some practical advice to minimize the damage from a possible attack.
As the year closes, Paul Roberts from Kaspersky Lab will reflect on noteworthy threats of 2011 as well as trends in the malware world that will impact us into 2012 and beyond.
Learn how these threats could impact your business, and what you need to do to mitigate your risk.
What will be discussed:
1. How to achieve deeper protection, comprehensive endpoint control and centralized administration.
2. How to protect against all types of Internet threats.
3. Rapid response to new malware attacks.
4. How to Optimize cost-effective security, licensing and purchasing that maximizes business productivity.
5. Customer-focused, global and local technical support expertise.
6. Combined power of signature-based, proactive and cloud-assisted protection technologies.
Natalya Kasperskaya graduated from the Moscow Institute of Electronic Machine Building (MIEM) in 1989 with a degree in applied mathematics. After graduation she worked as a research assistant at the Central Scientific Design Office.
In 1994 Natalya started working at KAMI Information Technologies Center where she was involved in managing an antivirus project, AVP, which in 2000 was renamed Kaspersky Anti-Virus.
She participates regularly in business development seminars and conferences worldwide. In 2010 she was co-chair of the first Horasis Global Russia Business Meeting in Ljubljana.
40% of enterprises report they have been compromised through social networking sites. Real-time multi-layered threat protection has become an art form and requires new deployment models.
It’s time to explore the value of a hybrid approach, combining on-premise and cloud-based Web security for the best of both worlds.
How can you adequately protect your business from the growing risks associated with Web 2.0 and social media?
Are you considering Web protection for remote employee access?
Is an enterprise hybrid deployment model best for you?
What should you look for in an integrated Web security and endpoint AV solution?
Get answers to these questions and much more.
In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
- What are the most vulnerable areas that cybercriminals look to exploit?
Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.
90% - Organizations who have experienced some form of external threat in the past 12 months.
We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
Technical presentations to educate delegates in the latest technological advances in security.
Markus Kluge, Head of Information Security, Unwire (Denmark)
Tamer Gamali, Group Chief Information Security Officer, National Bank of Kuwait & Board Member, (ISC)² EMEA Council
Frank Weisel, Regional Sales Manager, Vormetric
David Jacoby, Senior Security Researcher, Kaspersky Lab
Joseph Carson, Head of Product, Arellia
5 Ways To Tell If Your Current Anti-virus Solution Is Costing You Money And What You Can Do About It !Read more >
There is only one threat that you need to fight and conquer in 2017. We can write a few lines about how threats are changing or about the dynamic threat landscape. However, let’s spare you the pain of reading the same old blurb and instead let’s do the right thing and share with you the one single, biggest threat facing every single business. It’s been around forever however in 2017 exploiting this threat is most certainly going to cause increased financial pain and reputation damage.
Join Amar Singh, CEO of Cyber Management Alliance and founder of the Insights with Cyber Leaders series and other distinguished cyber leaders as they lay bare the severity of this threat.
Note: 30 Minutes webinar only with 15 minutes of interactive questions from the audience at the end.
Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.
Note: This is not your typical webinar where one, two or three sparks stand on the podium and proclaim their mastery. Rather, Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
- Infosecurity Europe 2016 -
BrightTALK favourite Amar Singh swung by the booth at Infosecurity Europe to give his thoughts on the information security world.
Amar discussed the encryption industry and how much influence the Apple iPhone unlock has been; cyber security in financial services and the improvements that need to be made to better protect peoples' data and money; protecting the IoT and the current landscape of threat actors.
It's no secret that there is massive shortage of skilled professionals in all cyber related fields including technical and managerial. The experience and knowledge of senior executives in the fields of cyber security, governance, risk and compliance are noteworthy and we feel that sharing that experience would benefit those who seek knowledge and guidance and those who want to better themselves and uplift their careers
Our Free to Access Insights with Cyber Leaders series features exclusive interviews with some of the most renowned Cyber Security Executives from around the globe.
Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.
Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
Free to view CISSP Identity and Access Management training. Learn from our CISSP expert trainer and practitioner, watch how he breaks everything down into easy to understand sections. This video covers
Identity and Access Management (Controlling Access and Managing Identity)
Physical and logical assets control
Identification and authentication of people and devices
Identity as a service (e.g. cloud identity)
Third-party identity services (e.g. on-premise)
Access control attacks
Identity and access provisioning lifecycle (e.g. provisioning review)
The CISSP candidate must have at least 5 years of paid full-time experience in 2 or more of the above (ISC)² CISSP CBK® domains to be recognised as a full CISSP. Those candidates with less than 5 years experience will be able to become CISSP Associates upon passing the exam. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience.
What if I don't have the required experience?
If you don't have the experience you can become an Associate of (ISC)² by successfully passing the CISSP exam. You'll then have 6 years to earn your experience to become a CISSP.
We caught up with Amar Singh to get his thoughts on the TalkTalk breach, what the company can do to restore faith and the steps security professionals should take, to avoid the same thing happening to their organisation.Read more >
We caught up with Amar Singh for his thoughts on the Ashley Madison hack and his suggestions for how to rebuild trust and visibly strengthen security for a shaken customer base...Read more >
2014 has been a bumper year for information security. Many of you will have begun now looking at your security strategy for the New Year. To help, here’s three of the industry’s top thinkers, giving you their opinion on what’ll be keeping them up at night in 2015...Read more >
We’re excited to announce that we’re broadcasting a LIVE VIDEO panel discussion, focused on the growing danger of advanced threats.
We’ve arranged four of the industry’s leading thinkers for this in-depth debate focused on the current threatscape, the industry's ATP trends and suggestions for effective breach prevention in 2015.
-> Jason Steer, Chief Security Strategist EMEA, FireEye
-> Raj Samani, VP & EMEA CTO, McAfee
-> Amar Singh, Founder, Give01Day
-> James Hatch, Head of Cyber Services, BAE Systems Applied Intelligence
-> Lindley Gooden (moderator), Managing and Creative Director, Greenscreen
The four thought leaders will be discussing the following ATP questions:
> Which factors define an advanced threat?
> How have advanced threats evolved over the last year?
> What key suggestions could be made looking ahead to deal with advanced threats?
> How can security professionals better adapt their organisations defences to deal with the current threatscape?
This is a blockbuster panel, filmed and broadcast live as part of the Advanced Threat Protection Summit. Tune in and listen to four of the industry’s leading thinkers, discuss the key issues keeping security professionals up at night.
All the panelists will also be available for 20 minutes of audience Q&A at the end. We look forward to seeing you join the debate!