NEWS

   

EVENTS

Conferences

Telarus Partner Summit 2019

TELARUS PARTNER SUMMIT 2019

August 07-08, 2019
Sponsored
Telarus Partner Summit is the premier event for Telarus Partners. This event has one ultimate goal in mind: train and empower our partners to be the go-to technology expert their clients want them to be and grow their wallet share. Just minutes from the Denver International airport is a brand new Ga...

Indianapolis CyberSecurity Conference

INDIANAPOLIS CYBERSECURITY CONFERENCE

June 19-19, 2019
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating...

Gartner Security & Risk Management Summit 2019

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2019

June 17-20, 2019
Understand new threats and challenges. Secure rapid innovation. Prepare for emerging technologies. Prioritize resilience. Make sure you have the latest insights on fast-moving IT trends such as IoT and AI, evolving security technologies and the ever-changing threat landscape. At Gartner Security &am...

Infosec in the City 2019

INFOSEC IN THE CITY 2019

June 19-20, 2019
Infosec in the City, Singapore 2019 is organised in response to calls for a more techno-centric conference in Singapore from the industry, community and government agencies. The event will focus on sharing and discussions of deep-technical knowledge and insights, cybersecurity capabilities and capac...

3rd Annual SecureWorld Chicago

3RD ANNUAL SECUREWORLD CHICAGO

June 13-13, 2019
Having attended SecureWorld conferences for over a decade, I can say definitively that they are more relevant to me today than ever. The CISO Advisory Council construct helps keep presentations attuned to the unique issues we commonly face in a dramatically changing environment we all want to secure...

China Cyber Security Conference & Exposition 2019

CHINA CYBER SECURITY CONFERENCE & EXPOSITION 2019

June 13-13, 2019
China Cyber Security Conference & Exposition 2019 (NSC 2019) will be held at the China National Convention Center in Beijing on June 13th, 2019. China Cyber Security Conference & Exposition is the leading information security event in China which has been successfully held for six years sinc...

Micro Focus Cybersecurity Summit 2019

MICRO FOCUS CYBERSECURITY SUMMIT 2019

June 11-13, 2019
Join us to hear from peers and Micro Focus experts as they share best practices and solution roadmaps to help you take a holistic, analytics-driven approach to securing what matters most – identities, applications, and data. Sessions will focus on how to manage risk, secure DevOps, guard priva...

Micro Focus Cyber Security Summit

MICRO FOCUS CYBER SECURITY SUMMIT

June 11-13, 2019
Join us for the second annual #MicroFocus #Cybersecurity Summit taking June 11-13, 2019 in Dallas. Hear from peers and Micro Focus experts as they share best practices and solution roadmaps to help you take a holistic, analytics-driven approach to securing what matters most – identities, appli...

 

Webinars

JUN 18, 2019 | 11:00am
GETTING RID OF THE PASSWORD – HOW TO INCREASE SAFETY AFFORDABLY
As many companies do not have the technical resources or the budget to overhaul their login and authentication systems entirely, third-party applications for CIAM solutions are becoming increasingly attractive. CIAM systems usually offer a variety of authentication mechanisms, including MF...
JUN 19, 2019 | 2:00pm
TOOLS IN THE FEDERAL CYBERSECURITY WORKFORCE TOOLBOX
The Federal government is constantly looking for creative ways to build and refresh talent as part of its cybersecurity workforce. American’s are drawn to work for the government because of its public service mission and other employment benefits. In a competitive job market, the fed...
JUN 20, 2019 | 1 PM
TOP 10 THREATS TO CLOUD SECURITY
The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back. Join us for a live webi...
JUN 20, 2019 | 3:00 pm
ANTI-HACKING AND PRIVACY LAWS FOR BUSINESSES: RIGHTS, REMEDIES AND LIMITATIONS
Join us for this Knowledge Group Online CLE Anti-Hacking Webinar. The business landscape has been a common ground for cyber-related threats such as hacking, data theft, and privacy infiltration. Such threats are perilous for many companies. Hence, it is of utmost importance that businesses...
JUN 20, 2019 | 11:30 AM
REVEALING THE DARK WEB: HOW TO LEVERAGE TECHNOLOGIES TO ALERT AND BLOCK DARK WEB ACCESS
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it's disturbingly easy to do. All you need is a computer, a Tor Browser and Cr...
JUN 20, 2019 | 1:00
INDUSTRIAL CYBERSECURITY: HOW TO GET STARTED AND WHY IT MATTERS TO FOOD & BEVERAGE PRODUCERS
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
Sponsored
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all ...
TODAY’S TOP SECURITY CONCERNS: ARE YOUR ERP APPLICATIONS READY?
Sponsored
In recent 451 Research studies, enterprises continue to report three primary security concerns. These challenges affect overall cybersecurity strategies as well as an organization’s business-critical application security: The maintenance of security hygiene is not just an ongoing issue for...
SHAPING THE FINANCIAL ECOSYSTEM WITH SECURE APIS
Sponsored
Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer exper...
IMPACT OF YOUR BUSINESS CONTINUITY PROGRAM ON CYBER RESILIENCY
Sponsored
Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processe...
BUSINESS AND RISK BASED FRAMEWORK DEPLOYMENT
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learne...
PANEL: FRAUD INVESTIGATIONS - HOW TO WORK EFFECTIVELY WITH LAW ENFORCEMENT, GOVERNMENT & LITIGATORS
Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private-sector organizations reciprocate and understand the how, what and why of the law enforcement/public body...

RESOURCES

To be fair, its method of assessing the security of operating systems is somewhat bunk. It sets a figure based on the number of vulnerabilities found rather than the importance of those vulnerabilitie...

Given the evolving way Web and Cloud applications are used— and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms...

Current challenges. According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. It enables criminals to generate large profits with a low risk of identification and preve...

Cyber risks pose unique threats to financial stability that are not well understood or managed, despite growing investment in research and dependence by financial institutions, consumers, and governme...

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involveme...

Sony, Target, Westinghouse, Home Depot, U.S. Steel, Neiman Marcus, and the National Security Agency (NSA). The security breaches suffered by these and many other organizations, including most recently...

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory co...

Threat intelligence is rapidly becoming an ever-higher business priority. There is a general awareness of the need to ‘do’ threat intelligence, and vendors are falling over themselves to o...

Decades ago, a group of merchants created a concept of general average—which is when all parties in a maritime venture share in losses resulting from a sacrifice of cargo in an emergency. What t...