Hi [[ session.user.profile.firstName ]]

#IMOS18 - Here Come the Robots: What and When to Automate Your Security

The first session to take place at our all-new Infosecurity Magazine Online Summit - #IMOS18 - will be: Here Come the Robots: What and When to Automate Your Security

There is a lot to be said for automation in the business world, and cybersecurity is no different. However, there are times when only human intuition and intelligence will do. As cyber-criminals get better and faster, the requirement for information security professionals and functions to keep up and stay one step ahead intensifies. Cyber-criminals use automation to launch attacks, and to have any chance of defending against them, automation is necessary. This session explores when it’s appropriate to automate and when robots just won’t cut the mustard.
Recorded Sep 11 2018 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Michael Hill - Speakers: Marc Lueck, Ed Tucker
Presentation preview: #IMOS18 - Here Come the Robots: What and When to Automate Your Security
  • Channel
  • Channel profile
  • Enabling Forensic Investigations that work Feb 28 2019 3:00 pm UTC 75 mins
    Moderator - Dan Raywood Speaker - Keith Lockhart
    In this webinar, we will look at this key part of the incident response strategy, and evaluate what forensic capabilities a company needs, and what you can expect from the results.
  • Detecting Insider Threats: Why Understanding Intent is Key Recorded: Feb 7 2019 67 mins
    Moderator - Dan Raywood - Speaker: Mayank Choudhary, Ed Tucker, Michael Gelles, Borna Emami
    This webinar will explore what is required to understand, detect and stop data exfiltration caused by insider threats.
  • 2019 Privacy Compliance and Risk Management Strategies for Infosec Professionals Recorded: Jan 31 2019 63 mins
    Moderator: Dan Raywood
    2018 saw a number of new privacy and security compliance acts introduced, including the GDPR, the NIS Directive and California’s Consumer Privacy Act (CCPA), all adding to the risk management complexity that security professionals need to comply with.

    In this webinar, we will look at the new compliance regulations and the challenges in complying with them, as well as what we can expect to see introduced in 2019.

    Key takeaways:
    How 2018’s new compliance frameworks will impact 2019
    Why you need to adapt your risk posture to comply with the new regulations
    How ‘regional’ privacy regulations impact the rest of the country and the world
    What additional changes may be coming in 2019
  • Preventing and Detecting Malicious Insiders Recorded: Jan 22 2019 60 mins
    Moderator: Michael Hill - Speaker: Dominic Vogel, Otavio Freire, Randy Trzeciak
    2018 has brought a new series of examples of how a malicious employee can wreak havoc by taking bribes to leak information, or just by stealing information before and after leaving the job. These cases are not reducing though, and new ways are needed to ensure that those determined to do harm are detected and prevented.

    In this webinar, we will look at some examples from this year and look at how insiders still pose a threat, and how to better deal with the problem in the future.

    Key takeaways:

    How to build an IT policy that works for the company’s security, and employee’s usability
    How to detect malicious activity, and also prevent unwitting errors
    What the common signs of malicious action are
    What can you learn from some of 2018’s headlines
  • Malware Mayhem: The Evolving Threat Landscape Recorded: Jan 17 2019 60 mins
    Moderator: Michael Hill - Speaker: Brandon Levene
    This webinar will explore how financially motivated malware has changed the security landscape over the year of 2018.
  • 2019: The Year for Businesses to Commit to Change & Become Secure by Design Recorded: Jan 17 2019 60 mins
    Michael Hill, Rory Duncan
    The past year has seen a number of high-profile cybersecurity breaches come to light, not to mention the biggest change to data regulation in decades. The consequences of a security breach can result in significant fines and reputational damage, meaning that security is no longer an IT challenge, but a business challenge.

    With business leaders now confident that digital is here to stay, they’re also recognizing their business success relies on them being secure by design.
    This change in mindset is happening at various levels throughout the organization. Business leaders are realizing that cybersecurity must be aligned with their overall business goals and, moreover, that they must be cybersecurity-conscious at every point in their digital transformation journey.
    In this webinar, we will explore:
    •How and why organizations now must be secure by design
    •How cybersecurity is becoming intelligence driven
    •What to consider when preparing for this cultural shift
  • InfosecNA18 Kisi Win Most Innovative Cyber Start-Up Contest Recorded: Jan 8 2019 6 mins
    Dan Raywood
    Kisi were named as the winner of the "Most Innovative Cyber Start-Up" at Infosecurity North America in November. Contributing Editor Dan Raywood talked to them at the conference in New York City.
  • 2018 Cybersecurity Headlines in Review Recorded: Dec 20 2018 64 mins
    Dan Raywood, Michael Hill Speakers: Matt Pascucci, Rowenna Fielding, Jim Doggett
    In this webinar, Infosecurity Magazine’s Michael Hill and Dan Raywood will be joined by guest speakers to review the key trends of the year, their impact now and in the future, and what we can expect from 2019.
  • #InfosecNA18 - Compliance and Privacy Change Recorded: Dec 20 2018 17 mins
    Richard Santalesa, Wayne Lonstein, Dan Raywood
    2018 has seen new compliance and privacy changes, specifically with the introduction of GDPR and also with the new California consumer privacy act. How can businesses deal with these new regulations?
  • #InfosecNA18 - Hiring and The Cybersecurity Skills Shortage Recorded: Dec 20 2018 20 mins
    Michael Nizich, Patrick Cohen, Dan Raywood
    We have been talking about the cybersecurity skills shortage for many years now, and reports vary in the numbers of how many vacancies there are now, and will be needed in the years to come. How are we overcoming this challenge?
  • #InfosecNA18 - Driving Awareness to Staff and The Board Recorded: Dec 20 2018 13 mins
    Dan Raywood, Tracey Dedrick
    If the employee can be your strongest link, as opposed to the weakest, then it is imperative that security policies and best practices are driven to the company, and that the company is on board with them. We talk to Tracey Dedrick from ISACA about this consistent issue.
  • #InfosecNA18 - New Network Security Tactics Recorded: Dec 20 2018 16 mins
    Dan Raywood, Luke McOmie, Ian Glover
    Network security has moved on from the perimeter and DMZ, to taking in new tactics like zero trust, as well as using bug bounty programs and red team exercises. We discuss how to work with them, and what changes they bring to enterprise security.
  • #InfosecNA18 - Ransomware, Phishing and BEC – The New Threats Recorded: Dec 20 2018 28 mins
    Dan Raywood, Brian Barnier, Otavio Freire & Matt Pascucci
    Looking at the current malicious threats on the internet, from ransomware impacts to more targeted phishing efforts such as business email compromise, and how to defend against them.
  • How Compliance Affects Security and the Cloud Recorded: Dec 13 2018 67 mins
    Moderator: Dan Raywood - Speakers: Daniele Catteddu, Robert Arandjelovic Ilias Chantzos
    Cloud became one the key strategies in cybersecurity during 2018, with use of IaaS increasing thanks to available and affordable services, as well as the increasing interest in containerization and availability of cloud access security broker (CASB) tools.

    However with availability comes data security, and the devil in the detail is how secure your data is in the cloud and the inherent risk of outsourced services. In this webinar we will look at the state of cloud security in 2018 and what changes we can anticipate in 2019.

    Key takeaways:

    How cloud is affected by GDPR and other compliance models
    Whether visibility in IaaS environments preventing use of the cloud
    What tools exist to better enable the route to cloud and compliance maintenance
    If cloud security has improved in 2018 overall
  • Keeping Secure in the Time of Digital Transformation Recorded: Dec 13 2018 62 mins
    Moderator: Dan Raywood - Speakers: Maxine Holt, James McKinlay, Jason Keogh
    As businesses move to be more dynamic, the process of digital transformation has one negative point – the security department is often left behind or seen as a prohibitive force. As the business seeks to be more agile, the security department needs to keep up with the business and the operational side IT to ensure that a divide does not become too wide.

    How can this be done? In this webinar we will look at how security can keep up with operations and a company seeking transformation, and the best ways to keep in tune and time with the business.

    Key takeaways:

    How to ensure the security agenda doesn’t obstruct the business agenda
    Ensuring that a good working balance is kept with corporate IT and operations
    Which tools are best to ensure a good SecOps strategy
    Keeping on top of an expanding attack surface
  • Guest Editor Recorded: Dec 13 2018 2 mins
    Sophie McCall
    Infosecurity introduces today's guest editor, Sophie McCall
  • Guest Editor Recorded: Dec 12 2018 3 mins
    Raj Samani
    Infosecurity introduces today's guest editor,Raj Samani
  • Live from #InfosecNA18 - Kevin Mitnick Recorded: Dec 12 2018 7 mins
    Dan Raywood, Kevin Mitnick
    Infosecurity Magazine Contributing Editor Dan Raywood sat down with Kevin Mitnick, hacker, speaker and best selling author, at Infosecurity North America 2018
  • Guest Editor Recorded: Dec 11 2018 3 mins
    James Lyne
    Infosecurity introduces today's guest editor, James Lyne.
  • Guest Editor Recorded: Dec 11 2018 3 mins
    Dr Jessica Barker
    Infosecurity introduces today's guest editor, Dr Jessica Barker.
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: #IMOS18 - Here Come the Robots: What and When to Automate Your Security
  • Live at: Sep 11 2018 8:15 am
  • Presented by: Moderator: Michael Hill - Speakers: Marc Lueck, Ed Tucker
  • From:
Your email has been sent.
or close