NEWS

   

EVENTS

Conferences

Telarus Partner Summit 2019

TELARUS PARTNER SUMMIT 2019

August 07-08, 2019
Sponsored
Telarus Partner Summit is the premier event for Telarus Partners. This event has one ultimate goal in mind: train and empower our partners to be the go-to technology expert their clients want them to be and grow their wallet share. Just minutes from the Denver International airport is a brand new Ga...

Gartner Security & Risk Management Summit 2019

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2019

June 17-20, 2019
Understand new threats and challenges. Secure rapid innovation. Prepare for emerging technologies. Prioritize resilience. Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security &am...

Infosec in the City 2019

INFOSEC IN THE CITY 2019

June 19-20, 2019
Infosec in the City, Singapore 2019 is organised in response to calls for a more techno-centric conference in Singapore from the industry, community and government agencies. The event will focus on sharing and discussions of deep-technical knowledge and insights, cybersecurity capabilities and capac...

Cyber Attack Hong Kong Series 2019

CYBER ATTACK HONG KONG SERIES 2019

June 20-20, 2019
Hong Kong Series provides the region's IT executives an opportunity to gather for a day of networking, collaboration, and knowledge- transfer through peer- led keynotes, breakouts, panels, and networking sessions.

Banking Cyber Security Forum

BANKING CYBER SECURITY FORUM

June 18-18, 2019
Banking Cyber Security Forum is an exclusive, top-flight event exclusively for senior banking executives, set to address each of these challenges and opportunities and encourages peer-to-peer conversation via a programme built around conversation opportunities with peers from across the banking sect...

The Banking Cyber Security Forum London

THE BANKING CYBER SECURITY FORUM LONDON

June 18-18, 2019
Nearly 563 million customer data records were compromised in 2018 alone, GDPR and data protection remains king and 2019 is set to be the year when the Payment Services Directive (PSD2) completely changes the face of banking. The pressure is on banks to remain competitive whilst maintaining impregnab...

3rd Annual SecureWorld Chicago

3RD ANNUAL SECUREWORLD CHICAGO

June 13-13, 2019
Having attended SecureWorld conferences for over a decade, I can say definitively that they are more relevant to me today than ever. The CISO Advisory Council construct helps keep presentations attuned to the unique issues we commonly face in a dramatically changing environment we all want to secure...

China Cyber Security Conference & Exposition 2019

CHINA CYBER SECURITY CONFERENCE & EXPOSITION 2019

June 13-13, 2019
China Cyber Security Conference & Exposition 2019 (NSC 2019) will be held at the China National Convention Center in Beijing on June 13th, 2019. China Cyber Security Conference & Exposition is the leading information security event in China which has been successfully held for six years sinc...

 

Webinars

JUL 11, 2019 | 10:00 AM PST-11:00 AM PST
Sponsored
AUTONOMOUS OR BUST - WHAT IS THE FUTURE OF IT OPERATIONS?
Understaffed, overwhelmed and overworked. IT Ops, NOC and DevOps teams are under siege like never before. IT execs, leaders and managers must answer three burning questions: How can IT Ops support new digital services that rely on today’s dynamic, fragmented & complex IT stack? At the same...
JUN 19, 2019 | 2:00pm
TOOLS IN THE FEDERAL CYBERSECURITY WORKFORCE TOOLBOX
The Federal government is constantly looking for creative ways to build and refresh talent as part of its cybersecurity workforce. American’s are drawn to work for the government because of its public service mission and other employment benefits. In a competitive job market, the fed...
JUN 20, 2019 | 1 PM
TOP 10 THREATS TO CLOUD SECURITY
The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back. Join us for a live webi...
JUN 20, 2019 | 3:00 pm
ANTI-HACKING AND PRIVACY LAWS FOR BUSINESSES: RIGHTS, REMEDIES AND LIMITATIONS
Join us for this Knowledge Group Online CLE Anti-Hacking Webinar. The business landscape has been a common ground for cyber-related threats such as hacking, data theft, and privacy infiltration. Such threats are perilous for many companies. Hence, it is of utmost importance that businesses...
JUN 20, 2019 | 11:30 AM
REVEALING THE DARK WEB: HOW TO LEVERAGE TECHNOLOGIES TO ALERT AND BLOCK DARK WEB ACCESS
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it's disturbingly easy to do. All you need is a computer, a Tor Browser and Cr...
JUN 20, 2019 | 1:00
INDUSTRIAL CYBERSECURITY: HOW TO GET STARTED AND WHY IT MATTERS TO FOOD & BEVERAGE PRODUCERS
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...