NEWS

   

EVENTS

Conferences

Cyber Attack Manila Series

CYBER ATTACK MANILA SERIES

August 29-29, 2019
Cyber Attack Manila Series provides the Philippines IT executives an opportunity to gather for a day of networking, collaboration, knowledge transfer through peer-led keynotes, breakouts, panels, and networking sessions. The conference focuses on defending the Philippines in cyberspace, cloud threat...

SmartSec Cyber Security Conference

SMARTSEC CYBER SECURITY CONFERENCE

September 03-04, 2019
About SmartSec SmartSec Cyber Security Conference is a 2-day event that focuses on Cyber Security. The event aims to bring the best of the best international professionals in the field of Cyber Security. SmartSec provides attendees with a unique opportunity.

9th Annual Peak Cyber Symposium

9TH ANNUAL PEAK CYBER SYMPOSIUM

September 03-05, 2019
The Information Systems Security Association (ISSA) - Colorado Springs Chapter will once again host the 8th Annual Peak Cyber Symposium from Tuesday, September 3rd to Thursday, September 5th, 2019 at the DoubleTree by Hilton, Colorado Springs, Colorado. This year's theme is "Cyber Hygiene: ...

10th Annual Billington CyberSecurity Summit

10TH ANNUAL BILLINGTON CYBERSECURITY SUMMIT

September 04-05, 2019
Thanks so much for your support and registering for our past summits. Our past event is in the video to the right. This year, our milestone 10th Annual Billington CyberSecurity Summit will have five major enhancements as we have a Call to Action for the cybersecurity community. Registration is now o...

Cyber Security Summit Denver

CYBER SECURITY SUMMIT DENVER

August 23-23, 2019
Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organiz...

Third Annual Physical Cyber Security Forum Phoenix

THIRD ANNUAL PHYSICAL CYBER SECURITY FORUM PHOENIX

August 22-22, 2019
The third annual Physical Cyber Convergence forum will bring corporate, information and physical security specialists together to discuss ways in which the security ecosystem is converging and how to handle hybrid threats from innovative new threat vectors. The discussions will be wide-ranging, with...

InfoSec Healthcare Connect 2019

INFOSEC HEALTHCARE CONNECT 2019

August 19-21, 2019
High-level Content, Intimate Networking and a White Glove Experience. This is InfoSecurity Healthcare Connect - where you can benchmark against other leaders in your industry, hear custom executive-level content and evaluate solutions that meet your specific needs up close. This is a luxurious and e...

Columbus, OH CyberSecurity Conference

COLUMBUS, OH CYBERSECURITY CONFERENCE

August 21-21, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

 

Webinars

AUG 27, 2019 | 3.30PM
THE CYCLE OF CYBER THREAT INTELLIGENCE
Too often, our community thinks of cyber threat intelligence (CTI) as just a finished product (or even just an indicator feed). But behind the scenes of that finished intelligence, there's an entire process that analysts should know to ensure their CTI is effective in helping drive bet...
AUG 27, 2019 | 1:30 PM
INSIDER THREAT PROGRAM REALITIES: NEW RESEARCH FROM ESG AND DTEX SYSTEMS
Join Enterprise Strategy Group (ESG) and Dtex Systems to get a detailed look at a newly released ESG Research Insights Report, "Insider Threat Program Realities." Based on the survey of 300 security and IT professionals in the US, the report underscores the continued struggle mos...
SEP 04, 2019
SOLVING THE HEADACHES OF NETWORK SECURITY IN WIRELESS COLLABORATION
Wireless presentation has become a necessity for many organizations. Corporate spaces require wireless presentation solutions in every huddle room, conference room, and boardroom. Education spaces utilize wireless presentation in classrooms containing kindergartener’s and PhD candida...
SEP 05, 2019 | 6:30 am
THE MOBILE SECURITY SPECTRUM
In 2019, 33% of all malware is targeted to mobile devices while only 10% of companies have a mobile security solution in place. Mobile Security is one of the most important issues for companies, and this will only increase in the coming years when there will be even more threats. One of th...
SEP 05, 2019 | 2:00 PM
CYBERSECURITY: WHY MSPS NEED TO PRACTICE WHAT THEY PREACH
The most recent data shows a majority of cyberattacks using Island Hopping – the art of compromising company A to attack company B.  The MSP community has become a target-rich environment, providing cybercriminals with the potential to have unfettered access to a multitude of se...
SEP 05, 2019 | 2 PM
AUTOMATING CONTAINER SECURITY WITH AWS AND LACEWORK
Using containers in AWS enables agile orchestration of application capabilities and require less coordination and oversight than on-premises or virtualization infrastructure. While containers allow you to build and release fast, security teams need to assess how they maintain security for ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...
LEARNING AT THE SPEED OF BUSINESS
Sponsored
Join Ian Stevens, North America L&D Lead at Publicis Sapient will share his team's successful learning programs that prepared Sapient's consultants to be leaders in digital transformation. Watch now to walk away with: A proven "push-pull" blended learning program How to tie learning with h...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...