NEWS

   

EVENTS

Conferences

Cyber Security for Advanced Manufacturing Conference

CYBER SECURITY FOR ADVANCED MANUFACTURING CONFERENCE

May 26-28, 2020
Defence iQ’s Cyber Security for Advanced Manufacturing Conference is the first sector-specific opportunity to tackle these issues. The conference offers a unique opportunity for advanced manufacturers to learn from and connect with cyber security specialists, technology leaders and policymaker...

National Cyber Summit

NATIONAL CYBER SUMMIT

June 02-04, 2020
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Gartner Security & Risk Management Summit 2020

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2020

June 01-04, 2020
Due to ongoing concerns about the coronavirus (COVID-19), Gartner has decided to postpone the Gartner Security & Risk Management Summit, scheduled to take place in National Harbor, June 1 - 4, 2020. We will be communicating new dates shortly. Ensuring the health and safety of our customers and e...

INFOSECURITY EUROPE 2020

INFOSECURITY EUROPE 2020

June 02-04, 2020
After monitoring the constantly evolving COVID-19 pandemic, we have made the decision to postpone Infosecurity Europe, which was scheduled to take place from June 2- 4 in Olympia, London. The health and safety of our exhibitors, visitors, partners and staff remains our number one priority and we wil...

41st IEEE Symposium on Security and Privacy

41ST IEEE SYMPOSIUM ON SECURITY AND PRIVACY

May 18-20, 2020
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. The 2020 Symposium will mark the 41st annual meeting of this flagship confe...

CISO Exchange for Healthcare

CISO EXCHANGE FOR HEALTHCARE

May 17-19, 2020
The CISO Healthcare Exchange is an exclusive forum designed to create an environment of true peer-to-peer collaboration and networking among senior level executives from some of the nation’s leading healthcare organizations. As the cyber security function continues to evolve with the emerging ...

The Fifth Annual Dallas Cyber Security Summit

THE FIFTH ANNUAL DALLAS CYBER SECURITY SUMMIT

May 15-15, 2020
The Fifth Annual Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive...

Global Cyber Innovation Summit 2020

GLOBAL CYBER INNOVATION SUMMIT 2020

May 13-14, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

 

Webinars

MAY 27, 2020 | 1:00 PM
IS YOUR THREAT HUNTING EFFECTIVE? A NEW SANS SURVEY
Today, many organizations around the globe struggle with getting top-tier threat hunters. Although threat hunting has become a mandatory task to establish an acceptable level of security, the demand for skilled hunters far exceeds the number of available specialists. In this new research, ...
JUN 11, 2020 | 10:00 AM
STATE OF THE CISO DURING A TURBULENT YEAR
What is keeping CISOs up at night? What isn’t these days! Hairpin turns in direction amid a global pandemic and evolving cyber-threats have caused disruption in business continuity, supply chains and infrastructure throughout 2020. This has given rise to diverse cybersecurity challen...
JUN 11, 2020 | 10:00 AM
AVOIDING THE SECURITY PITFALLS OF DIGITAL TRANSFORMATION
According to Gartner: “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”In the current business landscape, there’s no doubt t...
JUN 18, 2020 | 10:00 am
RANSOMWARE ATTACKS, DON’T BE A VICTIM
What are the cyberattacks global IT leaders need to be aware of in our current climate? Has the frequency or profile of attacks changed as a result of a higher number of remote workers? On Thursday 18th June a, join Chris Goettl, Director, Project Management at Ivanti, to gain visibility i...
JUN 24, 2020 | 11:00 AM
TAKE ACTION FROM YOUR SOAR PLATFORM TO KEEP YOUR DATA SECURE
Protecting your most critical asset, your data, is a top priority. Failing to so, could lead to a data breach and bring undesired consequences such as significant costs ranging from loss of business to expensive fines. Investing in technologies that help improve the ability to rapidly cont...
JUN 25, 2020 | 10:00 AM
ATTACK YOURSELF BEFORE THEY DO: STRENGTHEN SECURITY THROUGH BREACH AND ATTACK SIMULATION
Data breaches and cybersecurity attacks have not reduced in recent times, and whilst you can only do so much to protect against external attacks, you can attack yourself before they do.  Using breach and attack simulation (BAS), you safely run the entire kill chain of attacks against ...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
TOP TEN WAYS TO HANDLE CONTRACTS EFFECTIVELY IN-HOUSE
Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and t...
TOP TEN WAYS TO HANDLE CONTRACTS EFFECTIVELY IN-HOUSE
Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and t...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
MOVING BEYOND PASSWORDS TO DELIGHT AND SECURE USERS
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis. But in ...

RESOURCES

Next to your employees, your organization’s data is its most important resource. A data breach can devastate an organization’s finances and reputation for years. According to the 2019 Cost...

According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technolo...

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits ...

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes...

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is...

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis...

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally tak...

A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama ...

With so many of us hunting out the latest Covid-19 info, it hasn’t taken long for hackers to take advantage. So first off, a basic hygiene reminder: Don’t download anything or click on any...