NEWS

   

EVENTS

Conferences

Telarus Partner Summit 2019

TELARUS PARTNER SUMMIT 2019

August 07-08, 2019
Sponsored
Telarus Partner Summit is the premier event for Telarus Partners. This event has one ultimate goal in mind: train and empower our partners to be the go-to technology expert their clients want them to be and grow their wallet share. Just minutes from the Denver International airport is a brand new Ga...

31st annual conference

31ST ANNUAL CONFERENCE

June 16-21, 2019
Computer security incidents do not respect geographical or administrative boundaries in the global Internet. FIRST is designed to facilitate global communication between incident response and security teams to assist in promoting prompt and effective resolution to computer security incidents.

Rapid7 Boost 2019

RAPID7 BOOST 2019

June 24-24, 2019
No matter where you are in your cloud journey, join us to learn best practices for assessing, monitoring and operationalizing security for cloud and hybrid environments. Rapid7 experts will share actionable learnings that can be implemented into your security environment immediately. In addition, yo...

Security Operations Summit 2019

SECURITY OPERATIONS SUMMIT 2019

June 24-25, 2019
The Security Operations Summit brings together prominent practitioners from leading organizations for two days of in-depth talks and panel discussions around building, operating, and maturing a successful security operations program. Speakers will share innovative approaches and techniques they'...

Indianapolis CyberSecurity Conference

INDIANAPOLIS CYBERSECURITY CONFERENCE

June 19-19, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

Banking Cyber Security Forum

BANKING CYBER SECURITY FORUM

June 18-18, 2019
Banking Cyber Security Forum is an exclusive, top-flight event exclusively for senior banking executives, set to address each of these challenges and opportunities and encourages peer-to-peer conversation via a programme built around conversation opportunities with peers from across the banking sect...

The Banking Cyber Security Forum London

THE BANKING CYBER SECURITY FORUM LONDON

June 18-18, 2019
Nearly 563 million customer data records were compromised in 2018 alone, GDPR and data protection remains king and 2019 is set to be the year when the Payment Services Directive (PSD2) completely changes the face of banking. The pressure is on banks to remain competitive whilst maintaining impregnab...

3rd Annual SecureWorld Chicago

3RD ANNUAL SECUREWORLD CHICAGO

June 13-13, 2019
Having attended SecureWorld conferences for over a decade, I can say definitively that they are more relevant to me today than ever. The CISO Advisory Council construct helps keep presentations attuned to the unique issues we commonly face in a dramatically changing environment we all want to secure...

 

Webinars

JUL 11, 2019 | 10:00 AM PST-11:00 AM PST
Sponsored
AUTONOMOUS OR BUST - WHAT IS THE FUTURE OF IT OPERATIONS?
Understaffed, overwhelmed and overworked. IT Ops, NOC and DevOps teams are under siege like never before. IT execs, leaders and managers must answer three burning questions: How can IT Ops support new digital services that rely on today’s dynamic, fragmented & complex IT stack? At the same...
JUN 20, 2019 | 1 PM
TOP 10 THREATS TO CLOUD SECURITY
The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back. Join us for a live webi...
JUN 20, 2019 | 3:00 pm
ANTI-HACKING AND PRIVACY LAWS FOR BUSINESSES: RIGHTS, REMEDIES AND LIMITATIONS
Join us for this Knowledge Group Online CLE Anti-Hacking Webinar. The business landscape has been a common ground for cyber-related threats such as hacking, data theft, and privacy infiltration. Such threats are perilous for many companies. Hence, it is of utmost importance that businesses...
JUN 20, 2019 | 11:30 AM
REVEALING THE DARK WEB: HOW TO LEVERAGE TECHNOLOGIES TO ALERT AND BLOCK DARK WEB ACCESS
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it's disturbingly easy to do. All you need is a computer, a Tor Browser and Cr...
JUN 20, 2019 | 1:00
INDUSTRIAL CYBERSECURITY: HOW TO GET STARTED AND WHY IT MATTERS TO FOOD & BEVERAGE PRODUCERS
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, ...
JUN 25, 2019 | 1:30 PM
ENSURE ENTERPRISE-GRADE SECURITY FOR YOUR MOBILE APPS
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true ed...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...