Emerging Threats for 2015

Presented by

Steve Durbin, Managing Director, Information Security Forum (ISF)

About this talk

Barely a day goes by without news of a new cyber threat, or major data breach, arising from ‘malspace’ – an online environment inhabited by hacker groups, criminal organisations and espionage units. Regularly we’re reminded that these groups worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Cybercrime often involves sophisticated, targeted attacks against an organisation, and additional security measures are required to respond to specific cybercrime-related attacks and to put in place cyber resilience programmes that anticipate uncertainty – there is an ever increasing need for a prepared and comprehensive rapid-response capability, as organisations will continue to be subject to cyber-attacks regardless of their best efforts to protect themselves. But what are the threats that will cause the most upset in 2015? Cybercrime? Denial of Service? Cloud harvesting? And how can organisations best equip themselves to deal with a fast moving threat landscape? This webcast will highlight the key threats over the coming twelve months and offer ways of dealing with them and increasing your cyber resilience profile.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (139)
Subscribers (21664)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user