Incident rate. Mean time to discovery. Patch management coverage. These are terms that infosecurity professionals use on a daily basis, but have little to no meaning to those who measure performance in terms of dollars and cents. It's important for infosecurity practitioners to be able to communicate effectively with other departments, particularly the C-Suite and board level. CyVaR allows for the ability to quantify an organization's financial risk exposure to cyber attacks. Join PivotPoint Risk Analytics and (ISC)2 on July 12, 2016 at 1:00PM Eastern for a discussion and demonstration of the CyVaR service and how to reduce financial risk, as well as build a security budget based on ROI.Read more >
The Indian Government presented its 2016-17 budget on 29 February, widely expected to be a blueprint to power India's economic growth for the next three years.
Join Jonathan Schiessl and SImon Finch to hear their assessment of the outcomes of India's Union Budget and the implications for India and for investors.
The team explain:
•the main budget announcements and policy measures
•the potential impact across sectors
•what the budget means for foreign investors
Even the most security-minded organisation has limited budget and staff. How to decide where to spend these resources to provide maximum benefit to your organisation?
In this webinar Irene Michlin will discuss how your organisation can establish a repeatable process for decision making in such areas as:
•What and when to test
•Which threats urgently require mitigation
•What security training your staff needs
In a rapidly changing business climate, the allocation of resources and budgets are closely tied to a CISO's ability to selectively target and manage information security risk. The problem, of course, is that many organizations have little control, understanding or management of risks due to the traditional, reactionary nature of information security spending. Depending on company culture, information security budgets are usually controlled by the wrong metrics, often driven by prior year spending, audit findings, or through reactionary senior management decisions that ignore the stark reality of the organizational situation. In this webinar, Integralis discusses how to prioritize risk through a metrics-driven risk management process that is aligned with business objectives. Using this approach, organizations can experience an effective budgeting exercise while enabling business leaders to understand and accept the appropriate level of risk tolerance for the business.Read more >
According to our recently published Global Threat Intelligence Report, organizations are under attack every minute of every day. We need to figure out the appropriate balance of risk exposure within the context of our commercial objectives. When companies are able to take risk, they are able to grow and compete effectively. It’s all about understanding risk and making the best decisions for your organization. With threats changing, growing and moving, it’s important to consider risk exposure in the context of commercial objectives. This level of understanding allows you to identify and prioritize the security activities that need to take place, allowing you to move to a state of continuous risk management aligned to your business goals.
In this session we’ll cover:
· Real world examples of risk management driving business forward
· Prioritizing budget relative to risk and opportunity
· Addressing risk proactively and programmatically
· Aligning risk and GRC programs to business strategy
If you’re interested in helping move your organization to a state of managed risk and industry leadership, you won’t want to miss this webinar.
When it comes to securing an organization’s network, most stakeholders understand that cyber security education and training are not a luxury – they're a necessity. In this webinar we will discuss how best to spend those precious training dollars to get a solid return on investment.Read more >
The cyber threat landscape is dramatically evolving, but one thing is certain – attackers are becoming more and more sophisticated, and most organizations are struggling to keep pace. In a recent IANS and FireEye survey, security practitioners and decision makers share their perspective on the type of attackers they’re dealing with, how they’re responding to the growing threat, and the effect on organizations that have experienced a breach.
Join FireEye’s Chief Security Strategist (Forensics Group) Josh Goldfarb, and Dave Shackleford, IANS Lead Faculty, as they discuss:
•The kinds of products and controls most organizations are implementing
•What new technologies security teams are focusing on, and
•How security budgets are changing to align with security’s growing importance to the enterprise
This is one hour you will not want to miss!
In place of a threatened radical overhaul to pensions tax relief, Budget 2016 introduced numerous smaller measures impacting pension savings, including; the Lifetime ISA, changes to Stamp Duty Land Tax on commercial property and various improvements related to taking benefits, all of which will be discussed in the webinar. On top of these, there are the new forms of protection and tapering of the annual allowance.Read more >
This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:
- Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
- Reducing risk while supporting new business drivers
- Educating leadership and getting them on your team
- Efficacy of controls, desired improvements and wish lists
- Budgets and best practices
As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!
Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!
This session will reveal new strategies for:
•Finding financial and operational support for information security initiatives across the organization;
•Enlisting new, and at times, surprising allies for your information security projects;
•Building a virtual team of ‘defenders’ across the organization.
REGISTER TODAY for this insightful best practices session
Advanced threat techniques are available for purchase by cybercriminals who now target companies of all sizes for quick cash at high ROI. If you don’t have an army of IT security specialists and an unlimited IT budget, you’re probably feeling overwhelmed by the always-changing threat.
Join us for an informative webinar, “7 Secrets to Defending Against New Advanced Threats on a Budget.”
During this webinar you will learn the:
•Business dynamics accelerating advanced threat use by criminals
•Critical choke points that almost all advanced threats have to go through to succeed
•Tips for the most cost-effective and achievable ways to stop advanced threats today and tomorrow
Join this webinar to learn how to achieve both speed and protection for your network, while staying on budget. Organizations like yours are leveraging fast, affordable broadband to move to the cloud. And while you may use SSL to encrypt data, cybercriminals also use it to encrypt malware. Your high-speed network demands high-speed protection.Read more >
We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.Read more >
Nehmen Sie an diesem Webinar teil und finden Sie heraus, wie Sie von einem sicheren und schnellen Netzwerk profitieren, ganz ohne Ihr Budget zu sprengen. Immer mehr Organisationen setzen auf schnelle, erschwingliche Breitbandverbindungen, um die Vorteile der Cloud für ihr Geschäft zu nutzen. Möglicherweise verwenden auch Sie, wie viele Unternehmen, SSL zur Datenverschlüsselung. Leider tun das auch Cyberkriminelle, um Malware zu verschlüsseln. Für ein High-Speed-Netzwerk braucht es aber einen High-Speed-Schutz.Read more >
Join Brian Kavanagh and Kyle Havens as they offer a fast but detailed tour of the platform. See how Kenna has become an indispensable part of the security arsenal at companies such as PTC, Anthem, Hanesbrands, and Metlife.
In just 30 minutes, we'll cover how to:
- Connect all your scanner feeds to the Kenna platform
- Set up your risk meter dashboards for your technology environments
- View, track, and report on your risk posture
- See which patches give you the biggest bang for your buck
Problem Management is one of the most useful processes within ITIL as it allows an organisation to identify the underlying issues that generate incidents over and over again and removes them. It supports the change from reactive to proactive and makes customers happy by providing information and a process on those annoying issues that keep coming back to haunt them, and when they can expect to see them gone forever. However, with all this to offer many organisations still struggle to get the funding to implement this process as its seen as a duplication of effort with incident management.
Join Peter Hubbard, Pink Elephant, as he shows you how to set up this process on a part time, unfunded, but effective way. The point is not to say that Problem Management does not need a budget, its to show you how to build up support by doing the basics anyway and showing how much better it could be if the organisation DID fund it properly!
A spin off of Gene Kim upcoming Novel "When IT Fails" this presentation explores attributes of high-performing organizations juxtaposed against those that prefer the hampster-wheel-of-pain. Experts have told you the need for an ISMS or CMM, but what do these look like when properly implemented and what happens when they are not. Do not let compliance drive your organization's IT budget. Learn to take control an move beyond compliance.Read more >
If you’re confused about the cloud and your cloud security strategy, you are not alone. Even with increased security budgets in many organisations, 68% of business and IT executives we surveyed have security concerns.
It’s no surprise as to why.
Your control perimeter has decayed; data is on the move, shared across numerous platforms and accessed by multiple users. This webinar will cover how to locate and categorise data, understand and control who’s accessing it, and protect sensitive information against security breaches, putting you back in control.
Join your fellow professionals and register for our webinar which takes you through security and compliance for data that is always on the move.
Over the next three months, we’ll be holding a series of 4 webinars tackling threat and information protection.
1) €20 million reasons to embrace the new EU GDPR (21st April 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195977
2) The Cloud: Eliminate risks, Gain Control; release benefits (11th May 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195987
3) How are you managing the security skills shortage? (2nd June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195991
4) Clouds, hurricanes and cyber-attacks… (29th June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195993