#IMOS18 - Here Come the Robots: What and When to Automate Your Security
The first session to take place at our all-new Infosecurity Magazine Online Summit - #IMOS18 - will be: Here Come the Robots: What and When to Automate Your Security
There is a lot to be said for automation in the business world, and cybersecurity is no different. However, there are times when only human intuition and intelligence will do. As cyber-criminals get better and faster, the requirement for information security professionals and functions to keep up and stay one step ahead intensifies. Cyber-criminals use automation to launch attacks, and to have any chance of defending against them, automation is necessary. This session explores when it’s appropriate to automate and when robots just won’t cut the mustard.
RecordedSep 11 201856 mins
Your place is confirmed, we'll send you email reminders
2018 saw a number of new privacy and security compliance acts introduced, including the GDPR, the NIS Directive and California’s Consumer Privacy Act (CCPA), all adding to the risk management complexity that security professionals need to comply with.
In this webinar, we will look at the new compliance regulations and the challenges in complying with them, as well as what we can expect to see introduced in 2019.
How 2018’s new compliance frameworks will impact 2019
Why you need to adapt your risk posture to comply with the new regulations
How ‘regional’ privacy regulations impact the rest of the country and the world
What additional changes may be coming in 2019
Moderator: Michael Hill - Speaker: Dominic Vogel, Otavio Freire, Randy Trzeciak
2018 has brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job. These cases are not reducing though, and new ways are needed to ensure that those determined to do harm are detected and prevented.
In this webinar, we will look at some examples from this year and look at how insiders still pose a threat, and how to better deal with the problem in the future.
How to build an IT policy that works for the company’s security, and employee’s usability
How to detect malicious activity, and also prevent unwitting errors
What the common signs of malicious action are
What can you learn from some of 2018’s headlines
The past year has seen a number of high-profile cybersecurity breaches come to light, not to mention the biggest change to data regulation in decades. The consequences of a security breach can result in significant fines and reputational damage, meaning that security is no longer an IT challenge, but a business challenge.
With business leaders now confident that digital is here to stay, they’re also recognizing their business success relies on them being secure by design.
This change in mindset is happening at various levels throughout the organization. Business leaders are realizing that cybersecurity must be aligned with their overall business goals and, moreover, that they must be cybersecurity-conscious at every point in their digital transformation journey.
In this webinar, we will explore:
•How and why organizations now must be secure by design
•How cybersecurity is becoming intelligence driven
•What to consider when preparing for this cultural shift
Dan Raywood, Michael Hill Speakers: Matt Pascucci, Rowenna Fielding, Jim Doggett
In this webinar, Infosecurity Magazine’s Michael Hill and Dan Raywood will be joined by guest speakers to review the key trends of the year, their impact now and in the future, and what we can expect from 2019.
We have been talking about the cybersecurity skills shortage for many years now, and reports vary in the numbers of how many vacancies there are now, and will be needed in the years to come. How are we overcoming this challenge?
If the employee can be your strongest link, as opposed to the weakest, then it is imperative that security policies and best practices are driven to the company, and that the company is on board with them. We talk to Tracey Dedrick from ISACA about this consistent issue.
Network security has moved on from the perimeter and DMZ, to taking in new tactics like zero trust, as well as using bug bounty programs and red team exercises. We discuss how to work with them, and what changes they bring to enterprise security.
Moderator: Dan Raywood - Speakers: Daniele Catteddu, Robert Arandjelovic Ilias Chantzos
Cloud became one the key strategies in cybersecurity during 2018, with use of IaaS increasing thanks to available and affordable services, as well as the increasing interest in containerization and availability of cloud access security broker (CASB) tools.
However with availability comes data security, and the devil in the detail is how secure your data is in the cloud and the inherent risk of outsourced services. In this webinar we will look at the state of cloud security in 2018 and what changes we can anticipate in 2019.
How cloud is affected by GDPR and other compliance models
Whether visibility in IaaS environments preventing use of the cloud
What tools exist to better enable the route to cloud and compliance maintenance
If cloud security has improved in 2018 overall
Moderator: Dan Raywood - Speakers: Maxine Holt, James McKinlay, Jason Keogh
As businesses move to be more dynamic, the process of digital transformation has one negative point – the security department is often left behind or seen as a prohibitive force. As the business seeks to be more agile, the security department needs to keep up with the business and the operational side IT to ensure that a divide does not become too wide.
How can this be done? In this webinar we will look at how security can keep up with operations and a company seeking transformation, and the best ways to keep in tune and time with the business.
How to ensure the security agenda doesn’t obstruct the business agenda
Ensuring that a good working balance is kept with corporate IT and operations
Which tools are best to ensure a good SecOps strategy
Keeping on top of an expanding attack surface