NEWS

   

EVENTS

Conferences

Telarus Partner Summit 2019

TELARUS PARTNER SUMMIT 2019

August 07-08, 2019
Sponsored
Telarus Partner Summit is the premier event for Telarus Partners. This event has one ultimate goal in mind: train and empower our partners to be the go-to technology expert their clients want them to be and grow their wallet share. Just minutes from the Denver International airport is a brand new Ga...

Baltic Cyber Security Forum 2019

BALTIC CYBER SECURITY FORUM 2019

May 29-29, 2019
Baltic Cyber Security Forum is an Independent IT security event. It will be organized for the sixth time in Vilnius, Lithuania. On Autumn of 2018th the Forum came back with a success after one year break. The fact that our Partners and Participants haven’t forget BCSF, inspired us to continue ...

IT Web Security Summit 2019

IT WEB SECURITY SUMMIT 2019

May 27-31, 2019
In an increasingly connected, digital world, cyber security threats are constantly evolving and increasing in number and sophistication. Security professionals need to be up to speed with the latest technologies, techniques and skills for predicting and mitigating potentially crippling cyber-attacks...

3rd Annual International Cyber Security Conference

3RD ANNUAL INTERNATIONAL CYBER SECURITY CONFERENCE

June 03-04, 2019
Join senior government, academic and business cyber experts at the Third Annual International Cyber Security Conference which will be held at Christ Church, University of Oxford from 3-4 June.  This is a gathering of cyber security experts from the US, UK, Asia, Europe and the Middle East. ...

RVAsec

RVASEC

May 22-23, 2019
RVAsec is the first Richmond, Virginia, security convention to bring top speakers to the mid-atlantic region.  The conference will be held on Thursday, May 22 and 23 at the Commonwealth Ballroom at VCU’s University Commons. There will be no training classes this year.

DACHsec

DACHSEC

May 21-22, 2019
Uniting senior cyber security professionals from Germany’s, Austria’s, and Switzerland’s private and public sectors, DACHsec provides the platform for them to share urgent challenges and first-hand success stories, and to collaborate in formulating stronger security strategies agai...

40th IEEE Symposium on Security and Privacy

40TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY

May 20-22, 2019
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2019 Symposium will mark the 40th annual meeting of this flagship confe...

Astor Crowne Plaza - New Orleans

ASTOR CROWNE PLAZA - NEW ORLEANS

May 17-19, 2019
NolaCon is an Information Security/Hacker conference for professionals and enthusiasts alike located in New Orleans, offering training as well interesting and inventive talks and workshops. Our 2019 trainings are live ! The talks will cover a variety of topics focused on today’s infosec needs ...

 

Webinars

MAY 28, 2019 | 11:00 AM
CYBER THREAT INSIGHTS FOR FINANCIAL SERVICES
Organizations within the financial industry are well known for being popular targets of cyber attackers. According to IBM, the finance industry was the most frequently targeted industry in 2018, representing nearly twenty percent of all reported cyber attacks. Personally identifiable infor...
MAY 29, 2019 | 3:00 pm
CYBERSECURITY THREATS COME IN ALL SHAPES AND SIZES
Cybersecurity for retailers involves more than protecting customer credit card and payment information. Kilpatrick Townsend Partners Ray Aghaian and Doug Gilfillan discuss emerging cybersecurity threats, practical tips for preparing for a cyber-attack, and best practices for responding to ...
MAY 30, 2019 | 1:30 PM
ASSET MANAGEMENT: THE TOYOTA CAMRY OF CYBER SECURITY
Asset management - it's not the most exciting thing in the world. In an industry with technologies like automation, machine learning, and AI, asset management doesn't get a whole lot of attention, but it's foundational and one of the biggest problems organizations face today. S...
MAY 30, 2019 | 10:00
SECURITY BY OBSCURITY: THE FLIP-SIDE OF THE COMPLIANCE COIN
Bringing an idea from prototype to product involves challenges, including the need to comply with international standards and government regulations. This is especially true in industries such as construction, pharmaceutical and transportation, where lives are at stake. Regulatory and comp...
MAY 30, 2019 | 13:00
HOW TO ASSESS PHISHING AWARENESS & EVALUATE SIMULATION ALTERNATIVES
While many companies regularly run phishing simulations on their employees, evidence about this approach’s effectiveness is divisive. In addition, the culture of fear it engenders (by shaming those who fail) can be counterproductive, leaving your overtaxed security team to sift throu...
MAY 30, 2019
ENABLING GRC WITH SECURE AUTHENTICATION ACROSS THE DIGITAL ECOSYSTEM
The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...