Hi [[ session.user.profile.firstName ]]

#IMOS18 - Here Come the Robots: What and When to Automate Your Security

The first session to take place at our all-new Infosecurity Magazine Online Summit - #IMOS18 - will be: Here Come the Robots: What and When to Automate Your Security

There is a lot to be said for automation in the business world, and cybersecurity is no different. However, there are times when only human intuition and intelligence will do. As cyber-criminals get better and faster, the requirement for information security professionals and functions to keep up and stay one step ahead intensifies. Cyber-criminals use automation to launch attacks, and to have any chance of defending against them, automation is necessary. This session explores when it’s appropriate to automate and when robots just won’t cut the mustard.
Recorded Sep 11 2018 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Michael Hill - Speakers: Marc Lueck, Ed Tucker
Presentation preview: #IMOS18 - Here Come the Robots: What and When to Automate Your Security
  • Channel
  • Channel profile
  • Detecting Insider Threats: Why Understanding Intent is Key Feb 7 2019 3:00 pm UTC 75 mins
    Moderator - Dan Raywood - Speaker: Mayank Choudhary
    This webinar will explore what is required to understand, detect and stop data exfiltration caused by insider threats.
  • 2019 Privacy Compliance and Risk Management Strategies for Infosec Professionals Jan 31 2019 6:00 pm UTC 75 mins
    Moderator: Dan Raywood
    2018 saw a number of new privacy and security compliance acts introduced, including the GDPR, the NIS Directive and California’s Consumer Privacy Act (CCPA), all adding to the risk management complexity that security professionals need to comply with.

    In this webinar, we will look at the new compliance regulations and the challenges in complying with them, as well as what we can expect to see introduced in 2019.

    Key takeaways:
    How 2018’s new compliance frameworks will impact 2019
    Why you need to adapt your risk posture to comply with the new regulations
    How ‘regional’ privacy regulations impact the rest of the country and the world
    What additional changes may be coming in 2019
  • Preventing and Detecting Malicious Insiders Jan 22 2019 6:00 pm UTC 75 mins
    Moderator: Michael Hill - Speaker: Dominic Vogel, Otavio Freire, Randy Trzeciak
    2018 has brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job. These cases are not reducing though, and new ways are needed to ensure that those determined to do harm are detected and prevented.

    In this webinar, we will look at some examples from this year and look at how insiders still pose a threat, and how to better deal with the problem in the future.

    Key takeaways:

    How to build an IT policy that works for the company’s security, and employee’s usability
    How to detect malicious activity, and also prevent unwitting errors
    What the common signs of malicious action are
    What can you learn from some of 2018’s headlines
  • Malware Mayhem: The Evolving Threat Landscape Jan 17 2019 6:00 pm UTC 75 mins
    Moderator: Michael Hill - Speaker: Brandon Levene
    This webinar will explore how financially motivated malware has changed the security landscape over the year of 2018.
  • 2019: The Year for Businesses to Commit to Change & Become Secure by Design Jan 17 2019 3:00 pm UTC 75 mins
    Michael Hill, Rory Duncan
    The past year has seen a number of high-profile cybersecurity breaches come to light, not to mention the biggest change to data regulation in decades. The consequences of a security breach can result in significant fines and reputational damage, meaning that security is no longer an IT challenge, but a business challenge.

    With business leaders now confident that digital is here to stay, they’re also recognizing their business success relies on them being secure by design.
    This change in mindset is happening at various levels throughout the organization. Business leaders are realizing that cybersecurity must be aligned with their overall business goals and, moreover, that they must be cybersecurity-conscious at every point in their digital transformation journey.
    In this webinar, we will explore:
    •How and why organizations now must be secure by design
    •How cybersecurity is becoming intelligence driven
    •What to consider when preparing for this cultural shift
  • 2018 Cybersecurity Headlines in Review Dec 20 2018 4:00 pm UTC 75 mins
    Dan Raywood, Michael Hill Speakers: Matt Pascucci, Sarah Clarke, Jim Doggett
    In this webinar, Infosecurity Magazine’s Michael Hill and Dan Raywood will be joined by guest speakers to review the key trends of the year, their impact now and in the future, and what we can expect from 2019.
  • How Compliance Affects Security and the Cloud Recorded: Dec 13 2018 67 mins
    Moderator: Dan Raywood - Speakers: Daniele Catteddu, Robert Arandjelovic Ilias Chantzos
    Cloud became one the key strategies in cybersecurity during 2018, with use of IaaS increasing thanks to available and affordable services, as well as the increasing interest in containerization and availability of cloud access security broker (CASB) tools.

    However with availability comes data security, and the devil in the detail is how secure your data is in the cloud and the inherent risk of outsourced services. In this webinar we will look at the state of cloud security in 2018 and what changes we can anticipate in 2019.

    Key takeaways:

    How cloud is affected by GDPR and other compliance models
    Whether visibility in IaaS environments preventing use of the cloud
    What tools exist to better enable the route to cloud and compliance maintenance
    If cloud security has improved in 2018 overall
  • Keeping Secure in the Time of Digital Transformation Recorded: Dec 13 2018 62 mins
    Moderator: Dan Raywood - Speakers: Maxine Holt, James McKinlay, Jason Keogh
    As businesses move to be more dynamic, the process of digital transformation has one negative point – the security department is often left behind or seen as a prohibitive force. As the business seeks to be more agile, the security department needs to keep up with the business and the operational side IT to ensure that a divide does not become too wide.

    How can this be done? In this webinar we will look at how security can keep up with operations and a company seeking transformation, and the best ways to keep in tune and time with the business.

    Key takeaways:

    How to ensure the security agenda doesn’t obstruct the business agenda
    Ensuring that a good working balance is kept with corporate IT and operations
    Which tools are best to ensure a good SecOps strategy
    Keeping on top of an expanding attack surface
  • Guest Editor Recorded: Dec 13 2018 2 mins
    Sophie McCall
    Infosecurity introduces today's guest editor, Sophie McCall
  • Guest Editor Recorded: Dec 12 2018 3 mins
    Raj Samani
    Infosecurity introduces today's guest editor,Raj Samani
  • Live from #InfosecNA18 - Kevin Mitnick Recorded: Dec 12 2018 7 mins
    Dan Raywood, Kevin Mitnick
    Infosecurity Magazine Contributing Editor Dan Raywood sat down with Kevin Mitnick, hacker, speaker and best selling author, at Infosecurity North America 2018
  • Guest Editor Recorded: Dec 11 2018 3 mins
    James Lyne
    Infosecurity introduces today's guest editor, James Lyne.
  • Guest Editor Recorded: Dec 11 2018 3 mins
    Dr Jessica Barker
    Infosecurity introduces today's guest editor, Dr Jessica Barker.
  • Malware in IoT, Crypto-coins & Smart Devices - Prevention and Appropriate Action Recorded: Dec 6 2018 66 mins
    Moderator: Dan Raywood - Speakers: Patrick Donegan, Kevin Mcnamee
    Malware continues to be a problem, particularly in the case of gaining visibility into incidents, which leaves you blind to attack. The rapid growth of IoT botnets provides a challenge to businesses deploying unprotected IoT devices and is a threat to networks’ integrity. Networks and personnel must be able to detect and remove rogue IoT devices.

    In this webinar, we will look at learnings from Nokia’s annual Threat Intelligence report, as well as identifying tools that can be used to detect and mitigate malware in those environments, and the changing balance of responsibility between the end-user, enterprise and the service provider for protecting against these threats.

    Key takeaways:
    -How you can gain visibility into malware infestations
    -What to expect from leading service providers that step up to the challenge of protecting customers against malware infestations
    -Current trends in IoT and crypto-mining exploits, mobile and fixed device malware
    -Which mobile platforms are the most vulnerable
  • Managing the Insider Threat: Why Visibility Is Critical Recorded: Dec 4 2018 60 mins
    Moderator: Michael Hill - Speaker: Dominic Vogel, Mike Gillespie, Saikrishna Chavali
    In this webinar, we will explore:
    •The key components to gaining full cyber visibility: user activity, data activity, and analytics
    •How to incorporate insider threat management best practices
    •Key questions you should be asking to stem the risk of insider threat in your organization
  • Cybersecurity's Hidden Cost-From Post-Infection Detection to Advanced Prevention Recorded: Nov 29 2018 62 mins
    Moderator: Dan Raywood - Speakers: David Roth, Nick Frost, Andrew Hay
    The longer a threat or cyber-criminal is in your network, the more it’s going to cost you money and lead to potential data exfiltration, not to mention the impact upon your business.

    In this webinar, we will look at how to leverage better prevention technology to kill threats early in their lifecycle, reduce net spend and save your employees’ time.

    Key takeaways:
    How to be preventative without needing post-breach tools
    Understanding the true cost of prevention, detection and response
    How malware prevention fits into incident response
    What is deep learning and how it’s applied to cybersecurity
  • Protecting Your Enterprise from the Threat of Email Attacks Recorded: Nov 15 2018 63 mins
    Michael Hill, Ed Moyle, Jason Soroko, Jacob Gilden
    In this webinar we will be discussing the risks associated with BEC & EAC scams, what SMIME is and how to ensure your enterprise is protected.
  • How to Keep Data Secure in Multi-Cloud Environments Recorded: Nov 15 2018 60 mins
    Michael Hill, Slam Laqtib
    This webinar will explore the major challenges of encryption, access control and complexity in digital transformation and hybrid cloud adoption, investigating how knowing who has the controls to the ‘keys to the kingdom’ both on premise and across the cloud provider is a critical control mechanism.
  • How to Make Cybersecurity Effective, Practical, and Scalable Recorded: Oct 25 2018 58 mins
    Moderator: Michael Hill - Speakers: Jeremiah Cruit
    In our modern and highly-dynamic age of cybersecurity, every CISO and security team is inundated with hundreds of vendors and solutions to protect their applications, data and networks from increasingly advanced threats. Most seasoned security teams have implemented dozens of approaches and solutions, and evaluated many more, typically with less than favorable results.

    It can be challenging to identify the right solution for your organization without a deep understanding of both your application environment and the trends and challenges presented by an ever-evolving threat landscape.

    This webinar will explore how security leaders and their teams can sort through the noise to identify a modern solution that will allow them to effectively assess complex application vulnerabilities and keep up with the latest attack vectors.

    Key takeaways:
    • Learn what the future of cybersecurity looks like with modern applications and the growing vulnerabilities that web, on-premises, cloud, API and microservice architectures create, and how to adapt
    • Understand the inherent protection gaps that both new application models and advanced attack approaches can create in your cybersecurity solutions
    • Hear our panelists give their Top Five criteria for assessing both tools and approaches to protect your organization's assets
  • The Keys to Securing Data in Motion Recorded: Oct 4 2018 59 mins
    Moderator: Michael Hill - Speakers: Donnie MacColl, Harman Singh, Raef Meeuwisse
    Protecting sensitive data in motion is no easy task. Besides needing to prove compliance with the GDPR, PCI DSS and other regulations, many organizations deal with disparate scripts and FTP servers, lack of visibility into what’s happening with file transfers and other obstacles that make progress difficult.

    In this live webinar, we’ll explore the five keys of securing data in motion: encryption, automation, compliance, secure email and collaboration.

    Key takeaways:

    •Insight into the common challenges organizations face when securing their data in motion
    •Real insight of how taking an integrated approach to data security is working for organizations of all sizes
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: #IMOS18 - Here Come the Robots: What and When to Automate Your Security
  • Live at: Sep 11 2018 8:15 am
  • Presented by: Moderator: Michael Hill - Speakers: Marc Lueck, Ed Tucker
  • From:
Your email has been sent.
or close