NEWS

   

EVENTS

Conferences

2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY

2019 CYBER SYMPOSIUM INNOVATIONS IN CYBERSECURITY

September 19-20, 2019
View keynotes from world-class speakers, attend workshops from the top thought leaders in the industry and learn the best ways to handle cybersecurity in a constantly changing world – from corporate concerns to global threats. The NCC Cyber Symposium is a cyber conference for All Types of Lead...

Cyber Operations for National Defense Summit

CYBER OPERATIONS FOR NATIONAL DEFENSE SUMMIT

September 19-20, 2019
The ability to operate freely in the cyber domain is of critical importance to the United States. DSI’s 6th annual Cyber Operations for National Defense Summit will address the internet and internet-enabled technologies and how they enable much of our communications, economic activities, and m...

4th Enterprise Cyber Security conference

4TH ENTERPRISE CYBER SECURITY CONFERENCE

September 24-24, 2019
The cyber threat landscape is growing in complexity, resource and sophistication. New attacks emerge every day that are imaginative in execution and potentially devastating in impact. Meanwhile, the cyber domain has moved into every area of modern life, from the SCADA systems of nuclear stations to ...

ICS CyberSec 2019

ICS CYBERSEC 2019

September 24-24, 2019
The ICS Cybersec 2019 will be the leading conference in Israel where we get to hear from experts on the cyber risk, attack vectors and solutions for Industrial Control Systems (ICS). These systems are deployed to ensure safe, reliable and seamless operation of electricity, water and waste treatment ...

5th annual global cyber security forum - Lebanon

5TH ANNUAL GLOBAL CYBER SECURITY FORUM - LEBANON

September 18-18, 2019
The Lebanese Directorate General of Civil Aviation (DGCA) and the Civil Aviation Safety Center has partnered with Explore Exhibitions and Conferences to host the 5th Global Cyber Security Forum in Beirut, Lebanon on 18th September 2019 at the MEA Training and Conferences Center.

The Future MarTech Conference

THE FUTURE MARTECH CONFERENCE

September 16-18, 2019
The MarTech® Conference is coming to Boston September 16-18, 2019. And even though the event is less than a quarter-mile from our headquarters we didn’t see Conversational Marketing being showcased as a topic at the event. So we had an idea: what if we host an online event with some of our...

Charlotte Cyber Security Summit 2019

CHARLOTTE CYBER SECURITY SUMMIT 2019

September 17-17, 2019
The inaugural Charlotte Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive...

2019 Chicago Information Security Forum

2019 CHICAGO INFORMATION SECURITY FORUM

September 16-17, 2019
The IANS 2019 Chicago Information Security Forum delivers an immersive curriculum with 30+ sessions led by esteemed IANS Faculty, global information security thought leaders and solution providers. Attend the two-day Forum to gain actionable technical solutions and leadership insights focused on cur...

 

Webinars

SEP 19, 2019 | 11:30 AM
BUILDING EFFECTIVE ZERO TRUST KILL CHAINS USING DATA-CENTRIC ANALYTICS
Taking a Zero Trust approach that emphasizes users and data offers a significant opportunity to modernize security, and traditional kill chain models. While many of today's models leverage data detected on endpoints, they lack the critical context of how users are interacting with data...
SEP 19, 2019 | 11:00 am
THE MAKING OF CYBER SECURITY INNOVATORS: ORANGE POLAND (POLSKA)
When is the last time you thought about the level of innovation in your cybersecurity defense? Well, SecBI is happy to present you with some field-proven methods to boost your innovation with significant results in threat detection and response in your network and/or your customers’ ...
SEP 20, 2019 | 1 PM
ARE CYBERSECURITY SALES INCENTIVES HELPING OR HURTING THE INDUSTRY?
In this round table webinar we’ll discuss what are the current incentive structures for cybersecurity sales. How do salespeople take on that charge at different levels within the organization? What is working and what should be thrown into the garbage? Is there something new that sho...
SEP 23, 2019 | 1 PM
THE NEXT GENERATION OF APPLICATION SECURITY
Application security is an effective tool for defending against attacks. But as IT infrastructures shift to “software-defined everything” and move to the cloud, traditional appsec models no longer are enough to protect the application. This webinar takes a look at how companies...
SEP 24, 2019 | 11:30 AM
CAN'T STOP, WON'T STOP: HOW TO ACTUALLY PREVENT EMPLOYEE DATA BREACHES
People cause data breaches every day. That simple statement hides layers of complexity, compliance issues, and stress for CISOs and their security teams. While we may be able to 'logically' explain malicious breaches by linking them to motivations such as financial gain, it's o...
SEP 24, 2019 | 6:00 am
WHY GOING PAPER-LITE IS ESSENTIAL FOR YOUR FIRMS INFORMATION SECURITY
Law firms have traditionally been ‘paper-heavy’ environments and while firms are better aware of the benefits of going ‘Paper-Lite’, making it a reality has been easier said than done. A new entrant to the legal services market has made it their mission to enable la...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...