Hi [[ session.user.profile.firstName ]]

Defending Against Targeted Attacks and Insider Threats

Cyber-attacks are growing in complexity, and the rise of Advanced Persistent Threats (APTs) and insider threats has made organisations and government agencies more aware of their vulnerability. A comprehensive defense requires capabilities that go far beyond the firewall to protect against attackers that have penetrated the network perimeter. While no point security solution—technology-based or otherwise—can fully protect an organisation from cyber-attacks and APTs, today’s availability of cross-domain security solutions can help organisations protect themselves better than ever before.

In this roundtable discussion, participants from the National Bank of Kuwait, Accenture and CA Technologies will examine the current cyber security challenges facing organisations, including in the Middle East, and debate how the need for identity-centric security is critical today.

Moderator:
Tamer Gamali, President, (ISC)² Kuwait Chapter; Board Member, (ISC)² EMEA Advisory Council; CISO, National Bank of Kuwait

Speakers:
Shirief Nosseir, Business Lead, Information Security for the CA Technologies business in the Eastern Europe, Middle East and Africa
Simone Vernacchia
IT Strategy, Infrastructure & Security Consulting & Outsourcing Director, Accenture Middle East

WIN A FREE TICKET TO (ISC)² SECUREDUBAI CONFERENCE!
(ISC)² is giving away 3 non-member passes for the ISC)² SecureDubai Conference (November 24) to delegates who view the webinar for a minimum of 45 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://goo.gl/y3YzK2
Recorded Oct 1 2015 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tamer Gamali, Shirief Nosseir, Simone Vernacchia
Presentation preview: Defending Against Targeted Attacks and Insider Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Aug 21 2017 12:00 pm UTC 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Reduce Security Vulnerabilities in Enterprise Applications Aug 17 2017 11:00 am UTC 60 mins
    Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA
    Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
  • 6 steps to GDPR compliance Aug 1 2017 11:00 am UTC 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Developing Security Behaviours – 8 Practical Principles for Effective Change Recorded: Jul 19 2017 44 mins
    Sarah Janes, Managing Director, Layer8, Adrian Davis, Managing Director, (ISC)² EMEA
    Overwhelming evidence consistently shows that people are at the heart most data breaches. A new approach is needed, not so long ago technical attacks by hackers required technical solutions, but, as hackers find it more lucrative to target human vulnerabilities attention needs to be refocused on people.

    Discourse is shifting from awareness to culture change, however, early in its maturity, culture change lacks a universally accepted approach, and therefore people struggle to make change happen or to convince the business to invest.

    This webinar will provide 8 practical principles for effective change from auditing your current security culture through to embedding security as business as usual. It will provide a cohesive approach to behavioural change that can be measured. You will gain knowledge to help build a business case for culture change and techniques to use when your program launches.
  • The Role of Orchestration in Incident Response Recorded: Jun 29 2017 53 mins
    Chris Neely, CISSP, Director of Technical Sales, EMEA, IBM Resilient, Adrian Davis, Managing Director, (ISC)² EMEA
    Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best orgaizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.

    Join IBM Resilient’s Chris Neely, Director of Technical Sales, EMEA to explore the latest incident response methodology and technology. Can automation really save the day? From instant escalation, to automatic enrichment, to guided mitigation, Chris will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
  • DACH 2017 GDPR: Charting Experience on the March to May 2018 Recorded: Jun 28 2017 115 mins
    Yves Le Roux, Paul Lanois
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Roundtable: Critical Infrastructure: The Rise of the Political Hack Recorded: Jun 28 2017 48 mins
    Kelly Richdale, Dr. Wolfgang Spahn, André Mühlheim, Dr. Ciarán McMahon
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Adaptive Security for Cloud-Native Environments Recorded: Jun 28 2017 29 mins
    Martin Stemplinger, Strategic Security Deals Team Lead, BT Germany
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Security in M&A: The Forgotten Son of Information Security Recorded: Jun 28 2017 41 mins
    Marco Ermini, Senior Security Architect, Telefónica Germany
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Industry 4.0: Security Challenges for Smart Manufacturing Recorded: Jun 28 2017 36 mins
    Steffen Zimmermann, Head of Competence Center, VDMA e.V.
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Employee Loyalty – a Feasible Goal? Recorded: Jun 28 2017 39 mins
    Markus Klemen, CEO, SBA Research
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 (ISC)² Chapter Update & Developments Recorded: Jun 27 2017 17 mins
    Kelly Richdale, Jan-Tilo Kirchhoff, Markus Klemen
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Securing the Enterprise with Blockchain: Real Uses Beyond the Hype Recorded: Jun 27 2017 37 mins
    Richard Hudson, Lead IT Consultant, IT-Architecture - Applied Technology Research, msg systems ag
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Privacy in Cloud for Patient & Medical Data with Searchable Encryption Recorded: Jun 27 2017 29 mins
    Nagib Aouini, Head of Security Services, ELCA
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Roundtable: “Today’s Hot Topics and Burning Question Recorded: Jun 27 2017 46 mins
    Tamer Gamali, Thomas Holderegger, Markus Klemen, Jan-Tilo Kirchhoff
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Practical Cloud Controls Workshop Recorded: Jun 27 2017 164 mins
    Jan Bervar
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • DACH 2017 Keynote: The Increasing Importance of Information Security Recorded: Jun 27 2017 39 mins
    Thomas Holderegger
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • Change Liability for Accountability - GDPR with Cyber Security Risk Measurement Recorded: Jun 22 2017 63 mins
    Christopher Strand, Carbon Black, Andrew Barratt, Coalfire, Adrian Davis, (ISC)² EMEA
    This webcast will introduce a discussion of several threat models that help to illustrate how organizations can look to strengthen their security posture while supporting their GDPR strategy. Areas of concentration will include:

    • How to reduce the potential risk and liability associated with the GDPR data residency and data protection accountability requirements.
    • Focus on specific controls used to provide clarity and measure to any GDPR strategy within the enterprise.
    • An introduction of cybersecurity control measure that can help reduce threats to the enterprise, while ensuring acceleration of data and security regulatory accountability for any GDPR program.

    Session attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of balancing the confluence of security risks and the GDPR mandate. They will have some starting points on how they can create a plan to step beyond static regulatory alignment and apply collective intelligence, industry baseline initiatives and mandates, as well as shared industry intelligence, to better measure what’s most important to their cyber policy and regulatory GDPR requirements.
  • Investigation or Exasperation? The State of Security Operations Recorded: Jun 20 2017 58 mins
    Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers
    ●How organizations are coping with an average of 40 actionable security incidents per week
    ●Where teams are focusing their security efforts
    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Attribution: When Technical Information is Not Enough Recorded: Jun 13 2017 57 mins
    Ross Rustici, Senior Manager, Cybereason, Nathaniel Ford, (ISC)² EMEA
    After every major data breach, the security community engages in a game of whodunit. It's human nature to want a resolution and to see the perpetrators brought to justice. The problems with attribution are starting to be discussed more openly within the security community, with many firms questioning the utility of technical attribution. At the same time, all are in agreement that the model they continue to use is failing.

    Recent research proves that threat actors use a variety of techniques to create misattribution of the attacks. In our upcoming webinar, Cybereason's Ross Rustici, Sr. Manager Threat Intel, will discuss examples of attack misattribution and discuss whether correct attribution is still possible.

    Join us to learn:
    • Why attack attribution is a complex mission
    • The variety of techniques used by nation-state and criminal actors to disguise their involvement
    • An approach to help organizations better harness the power of attribution
(ISC)² EMEA Secure Webinars
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending Against Targeted Attacks and Insider Threats
  • Live at: Oct 1 2015 9:00 am
  • Presented by: Tamer Gamali, Shirief Nosseir, Simone Vernacchia
  • From:
Your email has been sent.
or close