Hi [[ session.user.profile.firstName ]]

The Future of Cybercrime

As more and more internet-enabled devices hit the market, securing these devices and our personal data is becoming an increasingly difficult task. Additionally, as more and more businesses make use of cloud-based services, new opportunities for criminals to exploit these services are appearing at a rapid pace as cybercrime becomes one of the most lucrative forms of crime we have ever seen. What cyberthreats will we start to see more of in the coming years? And what tactics will start to disappear?

In this webinar, Greg Iddon, Security Specialist at Sophos, will explore the future of cybercrime based upon the views and trends observed by members of Sophos and researchers at Sophos Labs, as well as how businesses and consumers can protect themselves from the threats and risks of tomorrow.
Recorded Oct 7 2016 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Iddon, Security Specialist at Sophos
Presentation preview: The Future of Cybercrime

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Deceiving the Attacker Nov 17 2020 5:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The 2021 Threat Forecast Nov 9 2020 4:00 pm UTC 60 mins
    Panel of experts
    With the current threat landscape evolving at a rapid pace and based on everything that has happened throughout 2020, businesses need to take a more proactive approach to cybersecurity in 2021.

    Join this panel of security experts and industry leaders to learn more about:
    - 2020: The year of COVID, remote working and breaches
    - Biggest lessons from 2020 and the path forward
    - New threats on the horizon
    - Strategies for dealing with ransomware, phishing attacks
    - Recommendations for CISOs for the year ahead
  • Email Security in the Age of Remote Work Oct 15 2020 3:00 pm UTC 60 mins
    Jo Peterson, Clarify 360; Dr Richard Ford, Cyren and Geoff Vaughan, Security Innovation
    There are an estimated 1.5 billion people working remotely due to COVID-19 and email is one of the ways businesses are communicating and staying connected with customers, employers and vendors. Ransomware, phishing and email exploits are continuing to rise. According to Security Magazine, over 96% of all security attacks begin with an email.

    Today’s panel will focus on:
    - the current state of email security and tools,
    - best practices for email safety, resilience planning, brand protection and thoughts on training
  • Securing Identity - 1 Year Check-In Oct 14 2020 4:00 pm UTC 60 mins
    Diana Kelley | Angela Leifson | Aidan Walden | Shareth Ben
    According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials.

    Last year, we kicked off The (Security) Balancing Act series with a panel of identity experts to help us understand the landscape. Join us for this 1 year check-in to learn what has changed for organizations in the last 12 months and the security implications of shifting to a more remote workforce.

    - 2020 vs 2019: Key changes & challenges for cybersecurity
    - How work from home has opened the door to attackers
    - Regulatory updates that may impact identity management programs
    - Why attackers are focused on credentials and authentication systems
    - What businesses can do to keep track of all endpoints, manage identities and privileged access, protect their data and maintain compliance

    Panelists:
    - Angela Leifson, Forensic Analyst for Oracle Cloud Infrastructure
    - Aidan Walden, Director, Public Cloud Architecture & Engineering at Fortinet
    - Shareth Ben, Executive Director, Insider Threat & Cyber Threat Analytics at Securonix

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Application Security for the Modern Enterprise Oct 14 2020 3:00 pm UTC 60 mins
    Peter Jones, 3B Data Security LLP; Jack Mannino, nVisium and Rodrigo Araujo, Bell Canada
    Web applications continue to be a popular vector for cyber attacks. According to the most recent Verizon Data Breach Investigations Report (DBIR), 43% of breaches analyzed in the report targeted web application vulnerabilities, more than double the number from last year. What does this mean for businesses in the era of remote working?

    Join this interactive keynote panel to learn more about:
    - How the shift of valuable data to the cloud, including email accounts and business-related processes has opened the door to attackers
    - The impact of COVID-19 on enterprise security posture
    - The role of compromised credentials in breaches
    - Application security challenges and the path forward
    - Best practices for a more secure enterprise
  • Securing Your Connected Devices at Home & at Work Oct 13 2020 4:00 pm UTC 60 mins
    Panelists TBA
    Connected devices are everywhere. More than 83 million U.S. households have at least one smart device, according to a study by the Consumer Technology Association. In fact, U.S. households own an average of 11 Internet-connected devices, according to a study from Deloitte, including seven with screens to view content (e.g. smartphones, tablets, laptops, TVs). 

    With so many devices on the home network, how is security keeping up? What is needed to make device security easier and faster?

    Find out why attackers are targeting internet-connected devices, some common attack vectors, and what to do to reduce the risk of breach at the endpoint.

    Join this panel of security experts to learn more about the security risks connected devices pose to your home and office, and what can be done about it:
    - Connected devices - the gateway for attackers
    - The likelihood that you or your company will be breached via connected devices 
    - Steps to mitigate the risk of breach
    - What is needed to close the gap in device security
    - Best practices for protecting your smart home from online threats

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.
  • How to Tie Up Loose Ends with Endpoint Security Oct 13 2020 3:00 pm UTC 60 mins
    Michelle Drolet, Towerwall; Brian Robison, BlackBerry and Jason Allen, Digital Hands
    As organizations are making plans to extend working from home through next summer, what are some things employees and IT teams can do to better protect their devices and networks? Learn more about how endpoint security can be implemented and improved to protect your organization from breaches.

    Join this interactive keynote panel with security experts and industry leaders to learn more about:
    - COVID-19’s impact on home network security
    - Why attackers are targeting the endpoint
    - Why your connected devices may be at risk and what to do about it
    - How to seamlessly integrate your endpoint security with existing solutions
    - Identifying threats, solutions and breach prevention best practices
  • Cyber Attack Trends & Threat Forecast for 2021 Oct 12 2020 3:00 pm UTC 60 mins
    Eric Adams; Roland Dobbins; Ed Adams; Jeff Foresman and Jorge Orchilles
    So far, 2020 has been a challenging year for everyone. COVID-19 and the push for a more remote workforce have left many organizations vulnerable to the risk of a cyber attack. With IT and security teams struggling with the challenges created by remote access attackers are rushing in to capitalize on the chaotic environments created by the pandemic. 

    Application security is becoming increasingly important. According to the Verizon 2020 DBIR, there has been an increase in cyber attacks on web applications, both in terms of percentage and in the raw number of breaches.

    So, what else is on the horizon for 2021?

    Join this panel of security experts and industry leaders to learn more about:
    - The COVID-19 impact on organizations and trends in recent cyber attacks
    - Phishing, ransomware and other cyber threats
    - Why web applications are a top target for attackers
    - Lessons from the front-lines and recommendations for dealing with a cyber attack
    - What organizations need to prepare for in 2021
    - How best to enable teams and secure the enterprise
  • Life and times of a CISO in a web app world Oct 8 2020 5:00 pm UTC 60 mins
    Malcolm Harkins Cymatic Chief Security & Trust Officer
    Trust is the cornerstone of the digital economy. In this talk Malcolm will cover what we need to do to generate trust. He will discuss the current state of trust in the web apps we use as well as the ones we provide to customers. He will cover today's reality with data from across the industry and his own experiences discussing the challenges/difficulties the CISO/CSO faces in securing web applications.

    Next, using the “9-box of controls” paradigm from the 2nd edition of his book, Managing Risk & Information Security, Malcolm will explain the economic principle of efficiency and how our current approach to information security is not only economically inefficient but also jeopardizes our ability to engender the trust we so desperately need. He will dive into the total cost of controls in the web app world: what it looks like today and where it will go if we do not transform our current security architecture.

    Throughout this webinar, Malcolm will share insight gleaned from the data, frameworks, and stories from industry experts to draw valuable lessons CISOs can bring back to their teams. In the end, he will offer hope and a roadmap to help participants transform their web application security to deliver real business outcomes that generate trust organically.
  • Protecting Connected Devices from Cyber Threats Oct 7 2020 4:00 pm UTC 60 mins
    Panelists TBA
    The proliferation of connected devices at home and in the workplace has opened the door to attackers, who often find poorly protected IoT devices as easy targets and entry points.

    This panel of security experts and industry leaders will explore the security risks that connected devices pose for individuals and organizations in the U.S. and what can be done to secure devices, deter attackers and overall minimize the risk of breach.
    - How connected devices have changed the game from a cybersecurity perspective?
    - Why connected devices are easy targets for attackers
    - Other cyber threats to be aware of when it comes to connected devices
    - What you can do to secure your devices at home and at work
    - Understanding the risk of breach
    - Best practices & how to #BeCyberSmart

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.
  • CISO Insights: How to Practice Cyber Hygiene & #BeCyberSmart Oct 5 2020 4:00 pm UTC 60 mins
    Dan Lohrmann | Earl Duby | Keith Hollender
    By popular demand, the CISO Insights series is back in October for National Cyber Security Awareness Month with a new episode on securing connected devices.

    Join this interactive Q&A discussion with CISOs to learn more about:
    - Why connected devices are a popular target for attackers
    - Steps for easy cyber hygiene at home and at work
    - Building a security culture together
    - CISO recommendations & best practices

    Speakers:
    - Dan Lohrmann, CSO & Chief Strategist, Security Mentor, Inc.
    - Earl Duby, CISO, Lear Corporation
    - Keith Hollender, former CISO; Partner, Global Cybersecurity Practice Lead at MorganFranklin Consulting

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.
  • Controlling the Chaos of Vulnerability Management Sep 29 2020 6:00 pm UTC 60 mins
    Steve Carter and Scott Kuffer (founders of Nucleus Security)
    With unpatched vulnerabilities causing one-third of breaches, most security professionals agree that effective, timely vulnerability management is imperative to keeping organizations safe. However, keeping every OS and every application, across every device in an enterprise environment, correctly configured and up-to-date, takes Herculean effort. The recent explosion of new vulnerability scanning tools, combined with widespread adoption of cloud and DevOps, demands a completely new approach to the vulnerability management process.

    In this talk, Nucleus co-founders Steve Carter and Scott Kuffer will discuss the concept of vulnerability management maturity, and how to structure your VM program to keep up with the speed of business. Learn the importance of leveraging orchestration and automation to design a vulnerability management program that scales to support the needs of large enterprises.
  • 6 ways CISOs are securing and navigating the cloud Sep 24 2020 3:00 pm UTC 60 mins
    Jo Peterson, Clarify 360; Brian ThompsonVP, Veeam Software; Michael Goldgof, Barracuda Networks; Carl Eberling, Forcepoint
    Cloud Adoption is on the rise again. According to IDG’s 2020 Cloud Computing Survey, 59 percent of respondents said their organizations would be mostly or all in the cloud within 18 months. Cloud changes our approach on so many levels—new technology, new shared responsibility model and new cybersecurity considerations

    In today’s session, we’ll explore 6 ways CISOs are navigating the cloud:
    - Securing an extended perimeter
    - Upskilling the team
    - Balancing Risk Management in Third Party Relationships
    - Defining the Shared Roles in a Shared Responsibility Model
    - Enhancing Visibility
    - Taking Advantage of Automation

    Moderator:
    Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Speakers:
    Brian Campbell--VP, Cyber Security Architect, Veeam Software
    Mike Goldgof--Senior Director, Product Marketing at Barracuda
    Carl Eberling-- CIO/CISO- Forcepoint
  • Battling Disinformation, Voter Suppression & Cyber Attacks Sep 23 2020 4:00 pm UTC 60 mins
    David Morris | Lee Imrey | Mark Rasch
    This episode of the Election Hacking Original series will explore the impact of social media platforms on democratic elections, with a special focus on the 2020 U.S. presidential election.

    Join this panel to ask your questions and learn more about:
    - Has anything changed since 2016 and how
    - What can we learn from examples of other elections around the globe when it comes to the spread of disinformation
    - How has disinformation been used to suppress voting
    - What's new on the threat landscape for November
    - What is the likelihood of a cyber attack against elections

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Detect and Halt Hackers from MITRE’s #1 software weakness Sep 22 2020 5:30 pm UTC 30 mins
    Archis Gore, CTO Polyverse
    In this webinar Archis Gore will cover memory-based attacks: why they are considered the most dangerous for your Linux IT systems, how you can detect them with a new open source tool called Zerotect and what you can do to stop these weaknesses.
  • Life on the Front Lines - Staying Sane in the SOC Recorded: Sep 16 2020 57 mins
    Diana Kelley, SecurityCurve | Vinay Pidathala, Menlo Security | Delyan Nestorov, Rapid7 | Charity Wright, Recorded Future
    Join this episode of The (Security) Balancing Act for an insider's view of life on the front lines of cybersecurity.

    This panel will look into what it's like to work in and manage a Security Operations Center (SOC), as well as share best practices for keeping your team of front-line defenders sane, empowered and happy, and your organization secure.

    The topics up for discussion during this episode include:
    - What kind of people are best suited for work in a SOC?
    - What kind of training / certifications / skills are needed to be successful?
    - How to handle alert fatigue and analyst overload?
    - Is automation (ML & AI) the answer?
    - What do you do when IOCs aren't enough?
    - Hunters vs. responders, what's the difference?
    - How the pandemic is impacting security operations?
    - Building a healthy team culture and managing self-care in the age of breaches
    - What's needed to make life easier for these front-line cyber defenders

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Hacking The Election: The Human Side [Part 2] Recorded: Aug 28 2020 61 mins
    David Morris | Neal O'Farrell | Barak Engel | Harrison Morris
    Please join us for a special 2020 Hacking The Election episode where we will go beyond the traditional bits and bytes of hacking the upcoming election.

    In this episode we will explore the other side of Hacking The Election; the Human side, covering such topics as:

    - Manipulating the electorate
    - Seeding mistrust in the election process and results among the voters
    - Fermenting anger and disenfranchisement
    - Polarizing the electorate

    A soft preview of what's to come in the November election.

    Panelists:
    - Neal O'Farrell, Founder at The PsyberResilience Project
    - Barak Engel, CEO, EAmmune
    - Harrison Morris, PhD Candidate Georgia Tech researching the intersection of Cybersecurity and Cognitive & Brain Sciences

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Hacking The Election: The Human Side [Part 1] Recorded: Aug 20 2020 55 mins
    David Morris | Lee Imrey | Midori Connolly | Lance James
    In the age of data collection and targeting by the campaigns, what can we learn from Gen Z? When it comes to data sharing, privacy and security awareness, what has changed in the population mindset since 2016? Are the lessons from the Cambridge Analytica scandal still applicable today? A soft preview of what's to come in the November election.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Supply Chain Security Recorded: Aug 18 2020 56 mins
    Diana Kelley | Kiersten Todt | Nick Charpentier
    According to new research from Risk Ledger, 60% of security breaches originate in the organization's supply chain; including third party vendors and applications. No matter what business an organization is in, supply chain security and resilience must be factored into business planning to ensure secure, ongoing operations even during times of crisis and disruption.

    Join this panel to learn more about:
    - Types of supply chains (hardware, software, services)
    - Common vulnerabilities in the supply chain
    - Assessing where your security gaps lie and addressing the risk
    - Impact of the COVID-19 pandemic on supply chain security
    - Recommendations for improving security in your supply chain and your risk management program
    - Benefits of Supply Chain Risk Management (SCRM)
    - What is the Cybersecurity Maturity Model (CMM), and how it can improve supply chain security
    - Solutions and approaches that can improve supply chain security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Top Threats Campaigns are Facing and How to Address Them Recorded: Jul 22 2020 60 mins
    David Morris | Mick Baccio | Frank Snyder | Lance James
    As the 2020 U.S. presidential election draws near, let's take a look at the top cyber threats campaigns are facing this election cycle and what can be done to address them.

    The lessons can easily be applied to the private sector and enable organizations to take steps toward better security.

    Join this panel to ask your questions and learn more about:
    - Domain spoofing
    - Email threats
    - Information warfare
    - Cyber attacks

    Speakers:
    - Mick Baccio, Splunk
    - Frank Snyder, Yubico
    - Lance James, Unit 221B

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Cybercrime
  • Live at: Oct 7 2016 11:00 am
  • Presented by: Greg Iddon, Security Specialist at Sophos
  • From:
Your email has been sent.
or close