#IMOS18 - Here Come the Robots: What and When to Automate Your Security
The first session to take place at our all-new Infosecurity Magazine Online Summit - #IMOS18 - will be: Here Come the Robots: What and When to Automate Your Security
There is a lot to be said for automation in the business world, and cybersecurity is no different. However, there are times when only human intuition and intelligence will do. As cyber-criminals get better and faster, the requirement for information security professionals and functions to keep up and stay one step ahead intensifies. Cyber-criminals use automation to launch attacks, and to have any chance of defending against them, automation is necessary. This session explores when it’s appropriate to automate and when robots just won’t cut the mustard.
RecordedSep 11 201856 mins
Your place is confirmed, we'll send you email reminders
A comprehensive and fully-functioning identity program is an ever-evolving mission. From creating security awareness that sticks with employees, getting executive buy-in and assembling the right team, there’s a lot to do.
Then, deciding the correct mix of services and solutions that are required for the identity program can be quite a challenging task. One thing is certain – security should not compromise user experience. If there is too much friction in the mix, users will avoid best practice.
In this webinar, we will explore:
•The key identity program challenges that exist today
•The solutions that will help into the future
•What group of solutions can help you deliver an effective identity program that is both robust and flexible
It’s a basic truth: You can’t secure what you can’t see.™ The more you know about your network, assets and risk posture, the less likely you are to be attacked. Each unknown device extends the attack surface and can leave your converged network vulnerable. Are you ready to mitigate this risk with 100% device visibility?
Join us on this webinar to learn how to achieve visibility of assets and devices, mitigate common risks in increasingly complex environments and operate efficiently and securely in the “security 4.0” era.
•Reduce business risk and disruption from security incidents and breaches
•Improve the accuracy of your risk assessments through accurate device intelligence
•Increase IT and OT security operations productivity
In today’s competitive business landscape and knowledge-based economy, we all rely on technology to be more productive and make our lives easier.
Organisations thrive when they trust their workforce to collaborate on valuable IP & work with critical systems. Perhaps, in their eagerness, some overlook the importance of verifying user trust with technology. This can leave an organisation open to the risk of losing data that is sensitive to the employees, customers and the business.
In a recent study of senior IT decision makers, 54% felt their organisations’ customers were more likely to care about cybersecurity compared to general employees, contractors/freelancers & third party vendors (35% – 36%).
As a result, it’s important for the security team to have the tools and policies in place to automatically monitor and quickly triage any risks that come with high levels of trust, to ensure the early detection of insider threats and ability to respond before an incident occurs.
In this webinar you will learn:
•Why increasing trust within the workplace is key for business success
•Why trust without verification can be a significant risk
•How to build trust through visibility and early detection of insider threats
Moderator: Dan Raywood Speakers: Nick Scholz, Nathan Wenzler
Digital transformation has revolutionized business and today's workforce, creating a significant cultural shift. Millennials and younger professionals now expect the hottest new tools that allow them to work how they want - from agile project management and ‘everywhere file access,’ to cloud-based collaboration and complete mobile availability.
These features bring about many benefits, but ask a modern security team and they’ll tell you about the struggle to provide solutions that offer the quick access, seamless collaboration and outstanding ease-of-use workers want whilst also maintaining high levels of compliance and a steady security risk profile.
The challenge is real, and you need real-world experience to face it successfully. In this webinar, we will look at how to enable a strategy that permits such levels of agility whilst remaining secure.
•How a world-class security strategy can enable collaboration
•The types of collaboration tools being requested now, and how to secure them
•How to deal with Shadow IT
•Maintaining the balance of creativity and security
For any organization, making sure that the security team have the required skills to face down threats is critical. But how do you know for sure which skills are present, and which are missing?
While there are indicators to help you answer these questions, solid metrics have been missing for a long time. How do you measure what skills have been learned? In this webinar we will look at how frameworks can aid an organization in overcoming these challenges.
• What the ideal frameworks are that you should follow
• Why organizations are adopting them to help their cyber teams identify weaknesses within their cyber ecosystem, and discover blind spots which may not originally have been apparent.
• How to use frameworks to bolster workforce development, using it as a tool to map out career progression
• How frameworks can underpin a robust cyber strategy and assist implementation of new tool, techniques and technology.
Moderator: Dan Raywood Speakers: Roey Eliyahu, James Jardine
SaaS, web and mobile applications are increasingly being built on application programming interfaces (APIs). Attacks targeting these APIs have become more prevalent and vulnerabilities in APIs continue to be disclosed, both leading to high profile breaches and negative headlines. The problem is compounded by many organizations continuing to rely on traditional security approaches designed to protect applications that were fundamentally different from those being developed today, as APIs have proliferated across environments to enable modern applications.
In this webinar, we will explore how enterprises need to adopt a proactive ‘monitor and respond’ approach rather than focusing solely on secure perimeters and access controls, and discuss how to prevent an attacker from exploiting unique API vulnerabilities.
Understanding the complexity of modern APIs, and how attackers can exploit them.
How to maintain a current catalog of APIs including where sensitive data is exposed and transmitted.
The importance of learning the unique logic and behavior of each API at a granular level to identify and stop malicious activity.
How security and development teams can improve workflows to improve API security
Steps in building an effective security strategy for modern web applications