#IMOS18 - Here Come the Robots: What and When to Automate Your Security
The first session to take place at our all-new Infosecurity Magazine Online Summit - #IMOS18 - will be: Here Come the Robots: What and When to Automate Your Security
There is a lot to be said for automation in the business world, and cybersecurity is no different. However, there are times when only human intuition and intelligence will do. As cyber-criminals get better and faster, the requirement for information security professionals and functions to keep up and stay one step ahead intensifies. Cyber-criminals use automation to launch attacks, and to have any chance of defending against them, automation is necessary. This session explores when it’s appropriate to automate and when robots just won’t cut the mustard.
RecordedSep 11 201856 mins
Your place is confirmed, we'll send you email reminders
2018 saw a number of new privacy and security compliance acts introduced, including the GDPR, the NIS Directive and California’s Consumer Privacy Act (CCPA), all adding to the risk management complexity that security professionals need to comply with.
In this webinar, we will look at the new compliance regulations and the challenges in complying with them, as well as what we can expect to see introduced in 2019.
How 2018’s new compliance frameworks will impact 2019
Why you need to adapt your risk posture to comply with the new regulations
How ‘regional’ privacy regulations impact the rest of the country and the world
What additional changes may be coming in 2019
Moderator: Michael Hill - Speaker: Dominic Vogel, Otavio Freire, Randy Trzeciak
2018 has brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job. These cases are not reducing though, and new ways are needed to ensure that those determined to do harm are detected and prevented.
In this webinar, we will look at some examples from this year and look at how insiders still pose a threat, and how to better deal with the problem in the future.
How to build an IT policy that works for the company’s security, and employee’s usability
How to detect malicious activity, and also prevent unwitting errors
What the common signs of malicious action are
What can you learn from some of 2018’s headlines
The past year has seen a number of high-profile cybersecurity breaches come to light, not to mention the biggest change to data regulation in decades. The consequences of a security breach can result in significant fines and reputational damage, meaning that security is no longer an IT challenge, but a business challenge.
With business leaders now confident that digital is here to stay, they’re also recognizing their business success relies on them being secure by design.
This change in mindset is happening at various levels throughout the organization. Business leaders are realizing that cybersecurity must be aligned with their overall business goals and, moreover, that they must be cybersecurity-conscious at every point in their digital transformation journey.
In this webinar, we will explore:
•How and why organizations now must be secure by design
•How cybersecurity is becoming intelligence driven
•What to consider when preparing for this cultural shift
Dan Raywood, Michael Hill Speakers: Matt Pascucci, Sarah Clarke, Jim Doggett
In this webinar, Infosecurity Magazine’s Michael Hill and Dan Raywood will be joined by guest speakers to review the key trends of the year, their impact now and in the future, and what we can expect from 2019.
Moderator: Dan Raywood - Speakers: Daniele Catteddu, Robert Arandjelovic Ilias Chantzos
Cloud became one the key strategies in cybersecurity during 2018, with use of IaaS increasing thanks to available and affordable services, as well as the increasing interest in containerization and availability of cloud access security broker (CASB) tools.
However with availability comes data security, and the devil in the detail is how secure your data is in the cloud and the inherent risk of outsourced services. In this webinar we will look at the state of cloud security in 2018 and what changes we can anticipate in 2019.
How cloud is affected by GDPR and other compliance models
Whether visibility in IaaS environments preventing use of the cloud
What tools exist to better enable the route to cloud and compliance maintenance
If cloud security has improved in 2018 overall
Moderator: Dan Raywood - Speakers: Maxine Holt, James McKinlay, Jason Keogh
As businesses move to be more dynamic, the process of digital transformation has one negative point – the security department is often left behind or seen as a prohibitive force. As the business seeks to be more agile, the security department needs to keep up with the business and the operational side IT to ensure that a divide does not become too wide.
How can this be done? In this webinar we will look at how security can keep up with operations and a company seeking transformation, and the best ways to keep in tune and time with the business.
How to ensure the security agenda doesn’t obstruct the business agenda
Ensuring that a good working balance is kept with corporate IT and operations
Which tools are best to ensure a good SecOps strategy
Keeping on top of an expanding attack surface
Moderator: Dan Raywood - Speakers: Patrick Donegan, Kevin Mcnamee
Malware continues to be a problem, particularly in the case of gaining visibility into incidents, which leaves you blind to attack. The rapid growth of IoT botnets provides a challenge to businesses deploying unprotected IoT devices and is a threat to networks’ integrity. Networks and personnel must be able to detect and remove rogue IoT devices.
In this webinar, we will look at learnings from Nokia’s annual Threat Intelligence report, as well as identifying tools that can be used to detect and mitigate malware in those environments, and the changing balance of responsibility between the end-user, enterprise and the service provider for protecting against these threats.
-How you can gain visibility into malware infestations
-What to expect from leading service providers that step up to the challenge of protecting customers against malware infestations
-Current trends in IoT and crypto-mining exploits, mobile and fixed device malware
-Which mobile platforms are the most vulnerable
Moderator: Michael Hill - Speaker: Dominic Vogel, Mike Gillespie, Saikrishna Chavali
In this webinar, we will explore:
•The key components to gaining full cyber visibility: user activity, data activity, and analytics
•How to incorporate insider threat management best practices
•Key questions you should be asking to stem the risk of insider threat in your organization
Moderator: Dan Raywood - Speakers: David Roth, Nick Frost, Andrew Hay
The longer a threat or cyber-criminal is in your network, the more it’s going to cost you money and lead to potential data exfiltration, not to mention the impact upon your business.
In this webinar, we will look at how to leverage better prevention technology to kill threats early in their lifecycle, reduce net spend and save your employees’ time.
How to be preventative without needing post-breach tools
Understanding the true cost of prevention, detection and response
How malware prevention fits into incident response
What is deep learning and how it’s applied to cybersecurity
This webinar will explore the major challenges of encryption, access control and complexity in digital transformation and hybrid cloud adoption, investigating how knowing who has the controls to the ‘keys to the kingdom’ both on premise and across the cloud provider is a critical control mechanism.
Moderator: Michael Hill - Speakers: Jeremiah Cruit
In our modern and highly-dynamic age of cybersecurity, every CISO and security team is inundated with hundreds of vendors and solutions to protect their applications, data and networks from increasingly advanced threats. Most seasoned security teams have implemented dozens of approaches and solutions, and evaluated many more, typically with less than favorable results.
It can be challenging to identify the right solution for your organization without a deep understanding of both your application environment and the trends and challenges presented by an ever-evolving threat landscape.
This webinar will explore how security leaders and their teams can sort through the noise to identify a modern solution that will allow them to effectively assess complex application vulnerabilities and keep up with the latest attack vectors.
• Learn what the future of cybersecurity looks like with modern applications and the growing vulnerabilities that web, on-premises, cloud, API and microservice architectures create, and how to adapt
• Understand the inherent protection gaps that both new application models and advanced attack approaches can create in your cybersecurity solutions
• Hear our panelists give their Top Five criteria for assessing both tools and approaches to protect your organization's assets
Moderator: Michael Hill - Speakers: Donnie MacColl, Harman Singh, Raef Meeuwisse
Protecting sensitive data in motion is no easy task. Besides needing to prove compliance with the GDPR, PCI DSS and other regulations, many organizations deal with disparate scripts and FTP servers, lack of visibility into what’s happening with file transfers and other obstacles that make progress difficult.
In this live webinar, we’ll explore the five keys of securing data in motion: encryption, automation, compliance, secure email and collaboration.
•Insight into the common challenges organizations face when securing their data in motion
•Real insight of how taking an integrated approach to data security is working for organizations of all sizes