Q&A session: Hackers and Threats- Cybercrime syndicates go global

Presented by

Steve Durbin, Managing Director, ISF Ltd

About this talk

Please join us for a live Q&A session on: Thursday June 11th, 9pm EST/ Friday June 12th, 11am AEST Join Steve Durbin, Managing Director of the Information Security Forum, for a Q&A session on the "Hackers and Threats- Cybercrime Syndicates Go Global" webinar Before the Q&A: •View the BrightTalk Webinar: https://www.brighttalk.com/webcast/9923/140645 •If you'd like, please send any questions you want to ask to Vicky Taylor (vtaylor@shelde.com) or alternatively, ask them during the session. "Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now. This webcast will share guidance and tips on how organisations can identify and protect the areas of their business that could be impacted by cybercrime activity."

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (140)
Subscribers (21675)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user