- BrightTALK at CRESTCON & IISP Congress -
BrightTALK caught up with Obrela Security Industry's George Paptis for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The elements and process to run a really comprehensive pentest
- How banks are still juicy targets for cyber criminals and what they can be doing to ensure they're fully protected.
- How to get the maximum results from a security budget.
- The positive steps that George sees in the cyber security industry
Incident rate. Mean time to discovery. Patch management coverage. These are terms that infosecurity professionals use on a daily basis, but have little to no meaning to those who measure performance in terms of dollars and cents. It's important for infosecurity practitioners to be able to communicate effectively with other departments, particularly the C-Suite and board level. CyVaR allows for the ability to quantify an organization's financial risk exposure to cyber attacks. Join PivotPoint Risk Analytics and (ISC)2 on July 12, 2016 at 1:00PM Eastern for a discussion and demonstration of the CyVaR service and how to reduce financial risk, as well as build a security budget based on ROI.Read more >
The Indian Government presented its 2016-17 budget on 29 February, widely expected to be a blueprint to power India's economic growth for the next three years.
Join Jonathan Schiessl and SImon Finch to hear their assessment of the outcomes of India's Union Budget and the implications for India and for investors.
The team explain:
•the main budget announcements and policy measures
•the potential impact across sectors
•what the budget means for foreign investors
Even the most security-minded organisation has limited budget and staff. How to decide where to spend these resources to provide maximum benefit to your organisation?
In this webinar Irene Michlin will discuss how your organisation can establish a repeatable process for decision making in such areas as:
•What and when to test
•Which threats urgently require mitigation
•What security training your staff needs
When it comes to securing an organization’s network, most stakeholders understand that cyber security education and training are not a luxury – they're a necessity. In this webinar we will discuss how best to spend those precious training dollars to get a solid return on investment.Read more >
The cyber threat landscape is dramatically evolving, but one thing is certain – attackers are becoming more and more sophisticated, and most organizations are struggling to keep pace. In a recent IANS and FireEye survey, security practitioners and decision makers share their perspective on the type of attackers they’re dealing with, how they’re responding to the growing threat, and the effect on organizations that have experienced a breach.
Join FireEye’s Chief Security Strategist (Forensics Group) Josh Goldfarb, and Dave Shackleford, IANS Lead Faculty, as they discuss:
•The kinds of products and controls most organizations are implementing
•What new technologies security teams are focusing on, and
•How security budgets are changing to align with security’s growing importance to the enterprise
This is one hour you will not want to miss!
In place of a threatened radical overhaul to pensions tax relief, Budget 2016 introduced numerous smaller measures impacting pension savings, including; the Lifetime ISA, changes to Stamp Duty Land Tax on commercial property and various improvements related to taking benefits, all of which will be discussed in the webinar. On top of these, there are the new forms of protection and tapering of the annual allowance.Read more >
Every organisation has invested recently in their assurance functions – budgets in compliance have grown by 10%, InfoSec by 17%, and ERM by 22% - but significant failures and incidents continue to occur. In addition, operational management regularly complain of assurance fatigue and ExCo’s increasingly demand a holistic approach to risk management or a “single view of the truth”.
Ian Beale, executive advisor at CEB, has more than 20 years' experience in the field of audit and risk. He relishes variety and new intellectual challenges, which proves useful in his role advising companies on critical and emerging risk and audit issues. On a daily basis, Ian works with global companies to identify risk priorities and areas of focus in a world that is rapidly changing.
This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:
- Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
- Reducing risk while supporting new business drivers
- Educating leadership and getting them on your team
- Efficacy of controls, desired improvements and wish lists
- Budgets and best practices
Join us live on Thursday, March 16th for a 30-minute FREE webinar& demo to discover how SAP Learning Hub gives unlimited access to all of SAP’s learning content and certification paths, as well as opportunities for collaboration, social learning and access to live systems in which to practise.
SAP Education and the UK & Ireland SAP User Group have collaborated to offer SAP customers a significant discount (up to 64%*) on an SAP Learning Hub subscription. Closing date for licence orders is 24th March 2017.
As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!
Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!
This session will reveal new strategies for:
•Finding financial and operational support for information security initiatives across the organization;
•Enlisting new, and at times, surprising allies for your information security projects;
•Building a virtual team of ‘defenders’ across the organization.
REGISTER TODAY for this insightful best practices session
Advanced threat techniques are available for purchase by cybercriminals who now target companies of all sizes for quick cash at high ROI. If you don’t have an army of IT security specialists and an unlimited IT budget, you’re probably feeling overwhelmed by the always-changing threat.
Join us for an informative webinar, “7 Secrets to Defending Against New Advanced Threats on a Budget.”
During this webinar you will learn the:
•Business dynamics accelerating advanced threat use by criminals
•Critical choke points that almost all advanced threats have to go through to succeed
•Tips for the most cost-effective and achievable ways to stop advanced threats today and tomorrow
We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.Read more >
Problem Management is one of the most useful processes within ITIL as it allows an organisation to identify the underlying issues that generate incidents over and over again and removes them. It supports the change from reactive to proactive and makes customers happy by providing information and a process on those annoying issues that keep coming back to haunt them, and when they can expect to see them gone forever. However, with all this to offer many organisations still struggle to get the funding to implement this process as its seen as a duplication of effort with incident management.
Join Peter Hubbard, Pink Elephant, as he shows you how to set up this process on a part time, unfunded, but effective way. The point is not to say that Problem Management does not need a budget, its to show you how to build up support by doing the basics anyway and showing how much better it could be if the organisation DID fund it properly!
Join Brian Kavanagh and Kyle Havens as they offer a fast but detailed tour of the platform. See how Kenna has become an indispensable part of the security arsenal at companies such as PTC, Anthem, Hanesbrands, and Metlife.
In just 30 minutes, we'll cover how to:
- Connect all your scanner feeds to the Kenna platform
- Set up your risk meter dashboards for your technology environments
- View, track, and report on your risk posture
- See which patches give you the biggest bang for your buck