GRC Security 2024: Notable Cybersecurity Events on the Horizon

GRC Security 2024: Notable Cybersecurity Events on the Horizon

Network with the best of the best cybersecurity experts at the top cybersecurity events in 2024 with cybersecurity conferences. Keep up with global security trends, challenges and best practices.

Contents

1. Setting the Stage: Cyber Security 2024 Events
2. A Sneak Peek: 2024’s Cybersecurity Events and Conferences
3. The 2024 Expedition: Cybersecurity and Data Protection

Are you feeling left out in the cybersecurity domain, where changes happen every second? Fear not! Attending cybersecurity events in 2024 is your golden ticket to staying ahead of the curve.
 

1.  Setting the Stage: Cyber Security 2024 Events

These cybersecurity events in 2024 are not just about listening to experts but are a treasure trove of networking opportunities, sharing ideas, and gaining insights that would otherwise require substantial effort and time for research. From the Cyber Security and Cloud Expo to the CS4CA event, these gatherings are intendedto provideprofessionals with the skills and resourcesthey need to elevate their cybersecurity approach.

So, mark your calendars for 2024 and prepare to experience a year of learning and growth in cybersecurity! Be part of the cybersecurity community that’s active locally and nationally at events across the globe. Remember, knowledge is power, and these events are your powerhouse. Don’t miss out!
 

2.  A Sneak Peek: 2024’s Cybersecurity Events and Conferences

Are you ready to dive into the ocean of cybersecurity knowledge? Buckle up! The year 2024 is packed with a myriad of cybersecurity events that are just waiting for your participation.

These events are your one-stop-shop for everything cybersecurity, from GRC to the latest threats and defenses. So, grab this opportunity to learn from the best, network with peers, and stay updated in this fast-paced field.

Get ready to explore, learn, and grow in the world of cybersecurity. Your journey starts here!

2.1  Cyber Security and Cloud Expo

The Cyber Security and Cloud Expo, RAI Amsterdam, is a must-attend event for cybersecurity enthusiasts. Here's a brief overview:

  • Who it's for: The event is expected to attract over 7,000 attendees globally, including Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers, and Data Protection Specialists.
  • Specialization: The event covers areas such as:
    • Zero Trust
    • Threat Detection and Response
    • Cyber Security Landscape
    • Identity and Access Management
    • Application Security
    • Hybrid Cloud strategies
    • Cloud Adoption
    • Cloud Transformation
    • Data Security
    • Disaster Recovery Strategies
    • Smart Cloud Security
  • When and where: The event will take place at RAI, Amsterdam, on 1-2 October 2024.
  • Agenda: More than 150 speakers will share their incomparable business knowledge and firsthand experiences at the conference through presentations, knowledgeable panel discussions, and fireside talks.
  • Notable speakers: Some of the notable speakers include:
    • Maikel Ninaber, Director, Cyber and Intelligence (C&I) at Mastercard
    • Arda Çirpili, Cyber Security Project Manager & Business Analyst at Rabobank
    • Piergiorgio Ladisa, Security Researcher PhD Student at SAP Labs France
    • René Pluis, Global Cyber Security Remediation Manager at Philips
    • Martin Sandren, IAM Product Lead at IKEA
  • Networking opportunities: During the VIP Networking Party, attendees will have the opportunity to interact with prominent people and have deep and important talks.
  • GRC in cybersecurity: The event will cover topics pertaining to governance, risk, and compliance (GRC) in cybersecurity. It will also include discussions on data security and protection, identity, privacy, compliance, GDPR and other regulations, and legal implications of cybersecurity breaches.
     
This event is a great opportunity to learn about the latest advancements in cybersecurity and cloud computing and to network with industry professionals.

2.2  RSA Conference 2024

The RSA Conference 2024 is a must-attend event for cybersecurity professionals. Here's a snapshot of what you can expect:

  • Who it's for: The conference is crafted for cybersecurity professionals who seek to stay ahead of the curve in the cybersecurity space.
  • Specialization: Attendees and speakers specialize in various areas of cybersecurity, including threat intelligence, infrastructure security, and more.
  • When and where: The conference will take place at the San Francisco MosconeCenter from May 6 – 9, 2024.
  • Agenda: The conference will feature expert-led sessions, keynotes, in-depth learning labs, and more, covering the latest trends, threats, and solutions in cybersecurity.
  • Notable speakers: Some of the keynote speakers include:
    • Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA)
    • Vijay Bolina, CISO Head of Cybersecurity Research at Google DeepMind
    • Adam Cohen,Senior Director and Associate General Counsel – Cybersecurity at Capital One
    • Michael Sentonas,President of CrowdStrike
  • Networking opportunities: The conference provides numerous opportunities for networking, such as interactive sessions and an expo.Here, the attendees can connect with industry vendors, meet product experts, discuss challenges, and demonstrate the latest solutions.
  • GRC in cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity.

This event promises to be a rich learning experience, offering insights into the art of the possible in the dynamic field of cybersecurity.

2.3  InfoSec World

InfoSec World 2024 is one of the most sought-after information security conferences. It is a convergence of cybersecurity experts and thought leaders, shaping the future of cybersecurity through insightful discussions and innovative solutions.

Here’s its overview:

  • Who it's for: The event is for cybersecurity professionals, including CISOs, CTOs, COOs, CIOs, Developers, IAM Architects/Engineers, IAM Directors, Information Security Officers, IS/IT Directors/Managers, Product Managers, Security Architects, and Security Infrastructure Engineers.
  • Areas of Specialization: The attendees and speakers specialize in various areas of cybersecurity, including
    • Application Security
    • Cloud Security
    • Cyber Crime
    • Data Protection
    • DevSecOps
    • Governance, Regulation and Compliance (GRC)
  • Date, Time, and Place: The event will take place from September 23-25, 2024, at Disney’s Coronado Springs Resort, Lake Buena Vista, Florida.
  • Agenda and Topics: The event will feature world-class conference programming, enlightening keynotes, and a vibrant expo floor featuring the latest security solutions. Topics covered include cybercrime, data protection, DevSecOps, governance, regulation and compliance (GRC), and more.
  • Notable Speakers: Some of the notable speakers include:
    • Scott Shapiro, Founding Director of the Yale CyberSecurity Lab
    • Rachel Wilson, Managing Director and Head of Cybersecurity of Morgan Stanley Wealth Management
    • Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk & Resilience of the U.S. Department of Homeland Security
  • Networking Opportunities:It provides a network of over 2,500 security professionals, offering ample opportunities for networking.
  • GRC in Cybersecurity:It covers topics related to governance, regulation, and compliance (GRC) in cybersecurity. 

This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the industry.

2.4  Nordic IT Security Event

  • Audience: The event is primarily for cybersecurity professionals who are keen on staying updated with the latest developments in the field. It's a platform for seasoned industry professionals to discuss business-critical topics.
  • Specialization: The attendees and speakers at this event come from various specializations within cybersecurity. This includes areas like threat intelligence, infrastructure security, and many more.
  • Date, Time, and Venue: The event is scheduled to take place on May 23, 2024, at the Stockholm Waterfront Congress Center.
  • Agenda: The conference will feature expert-led sessions, keynotes, and in-depth learning labs. These will cover the latest trends, threats, and solutions in cybersecurity.
  • Speakers: The event will host several notable speakers,including:
    • David Jacoby, an Ethical Hacker with over 25 years of experience
    • Mikko Hypponen, a globally recognized cybersecurity expert and Chief Research Officer for With Secure
    • Arnaud Wiehe, a thought leader in cybersecurity who has served as a CISO for multiple years
    • Patric J.M. Versteeg, a visionary executive passionate about revolutionizing information and cybersecurity management
    • Nir Chervoni, the Head of Data Security at Booking.com
  • Networking Opportunities: The conference provides numerous networking opportunities. This includes interactive sessions and an expo where attendees can connect with industry vendors, meet product experts, discuss challenges, and demo the latest solutions.
  • GRC in Cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity.

This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the field. It's a platform that brings together the best minds in the industry to discuss and address the challenges faced by global communities in the 21st century.


2.5  Cyber Security World Asia

The Cyber Security World Asia is one of the cybersecurity conferences to attend in 2024 for these reasons:

  • Audience: The event is for professionals, business leaders, and cybersecurity enthusiasts.
  • Specialization: Attendees and speakers specialize in various areas of cybersecurity, including:
    • Zero trust
    • Data protection
    • DevSecOps
  • Date, Time, and Place: The event will take place on 9-10th October 2024 at Marina Bay Sands, Singapore.
  • Agenda and Topics Covered:Keynote addresses, panel discussions, interactive workshops, and networking opportunities will all be included in the conference. It will also cover the newest developments, difficulties, and tactics in cybersecurity.
  • Networking Opportunities: The event offers unique opportunities for networking and knowledge exchange, with the potential to create partnerships and collaborate with peers.
  • GRC in Cybersecurity: GRC (Governance, Risk, and Compliance) is a crucial aspect of cybersecurity. It aligns IT goals with business objectives while effectively managing cyber risks and achieving regulatory needs. 

This event is a must-attend for anyone looking to stay updated on the latest in cybersecurity and network with industry professionals.


2.6 Cybersecurity Expo

  • Who is the event for: The Cybersecurity Expo is intended for a broad spectrum of attendees who are interested in the latest developments in the field. It includes cybersecurity professionals, business leaders, and enthusiasts.
  • Areas of Specialization: The attendees and speakers at the event specialize in various areas of cybersecurity. This includes but is not limited to zero trust security models, data protection strategies, and DevSecOps practices.
  • Date, Time, and Place: The event is scheduled to take place on 31st October 2024. The venue for the event is the QEII Centre, located in Broad Sanctuary, London, SW1P 3EE.
  • Agenda and Topics Covered:Plenty of different activities, such as interactive workshops, panel discussions, and keynote addresses, will be offered during the conference. These sessions will cover a wide range of topics, providing insights into the latest trends, challenges, and strategies in cybersecurity.
  • Notable Speakers: The event will feature a lineup of industry leaders from various organizations. Some of the confirmed speakers include representatives from Northrop Grumman, Counter Terrorism Policing, Jacobs, CGI, Matchtech, Mott MacDonald, and QinetiQ.
  • Networking Opportunities: The Cybersecurity Expo offers attendees unique opportunities for networking and knowledge exchange. This includes the potential to create partnerships and collaborate with peers from various sectors within the cybersecurity industry.
  • GRC in Cybersecurity: Governance, Risk, and Compliance (GRC) is a crucial aspect of cybersecurity. It involves aligning IT goals with business objectives, managing cyber risks, and meeting regulatory needs. GRC in cybersecurity is about ensuring that an organization’s IT systems and processes are aligned with its business objectives, managing cyber risks, and meeting all relevant industry and government regulations.

This event is a must-attend for anyone seeking to stay updated on the latest in cybersecurity and network with industry professionals.


2.7  Infosecurity Europe

The Infosecurity Europe is one of the best security conferences and events in the northern hemisphere for these reasons:

  • Who the event is for: Infosecurity Europe is for everyone in information security, from experts and engineers to innovators and industry leaders.
  • Areas of specialization: The attendees and speakers specialize in various areas of information security, including cybersecurity knowledge, infosec tools, and complex threat environments.
  • Date, time, and place: The event will take place from 4-6 June 2024 at ExCeL London.
  • Agenda and topics covered: The conference program covers a wide range of topics in information security. It includes keynote sessions, panel discussions, fireside chats, and interviews. The 2024 conference program is yet to be announced.
  • Networking opportunities: The event provides opportunities to connect with emerging and established international suppliers worldwide. It also allows attendees to grow new relationships through diverse networking opportunities.
  • GRC in cybersecurity: While the specific topics for the 2024 event are not yet announced, GRC (Governance, Risk, and Compliance) is a crucial aspect of information security and is likely to be covered.


2.8  Gartner Security & Risk Management Summit

The Gartner Security and Risk Management Summit is a must-attend cybersecurity summit for security and risk management leaders. Here's what you need to know:

  • Who it's for: The summit is designed for Chief Information Security Officers, Security Operations, Risk Management Leaders, IAM Leaders, Security Architects, Technical Professionals, Infrastructure Security Leaders, and Data and Application Security Leaders.
  • Specialization: The attendees and speakers specialize in cybersecurity, risk management, infrastructure security, application and data security, and more.
  • When and where: The summit will take place on June 3 – 5, 2024, in National Harbor, MD.
  • Agenda: The summit will cover topics like:
    • the impact of Generative AI on security
    • cybersecurity value drivers
    • infrastructure security
    • cybersecurity board reporting
  • Networking opportunities: The summit provides opportunities for networking through roundtables, peer conversations, end-user case studies, and social engagements. There's also a dedicated program called the CISO Circle for chief information security officers. It will cover keynote speaker speeches, Magic Quadrant sessions and market guides, solution provider sessions, workshops, midsize enterprise programs, and diversity, equity, and inclusion sessions.
  • GRC in cybersecurity:The summit will cover a broad range of topics in cybersecurity, which may include Governance, Risk, and Compliance (GRC).

 
This event is a great opportunity to learn from leading experts, share experiences, and gain insights into the latest trends and strategies in cybersecurity and risk management.


2.9  CS4CA

The CS4CA is one of the top security conferences in 2024. It focuses on the aspects mentioned in the following:
 
  • Audience: The CS4CA event is designed for IT & OT security professionals from critical infrastructure sectors across the globe.
  • Specialization: The attendees and speakers specialize in cybersecurity for critical assets, with a focus on industries like Energy, Agriculture, Oil & Gas, Manufacturing, Aviation, Transport, and more.
  • Date, time, and place: The CS4CA event is scheduled to take place at different locations throughout 2024. These include:
    • Houston, Texas (March 26th - 27th)
    • Singapore (April 3rd - 4th)
    • Calgary, Canada (June 11th - 12th)
    • London, UK (September 24th - 25th)
  • Agenda and topics covered: The event will address key challenges in cybersecurity, such as managing risks, ensuring cyber resilience, and implementing effective governance, risk, and compliance (GRC) strategies.
  • Notable speakers: The event features a line-up of expert speakers, including:
    • John Ellis (CISO, Bupa)
    • Manjunath Pasupuleti (CISO, ENNOVI)
    • Roshan Daluwakgoda (CISO, Eastern Health)
    • Andrew Ginter (VP Industrial Security, Waterfall Security Solutions)
  • Networking opportunities: The event provides ample opportunities for networking, learning, and collaboration among senior IT and OT stakeholders.
  • GRC in cybersecurity: The event covers the importance of a good Governance, Risk, and Compliance (GRC) strategy in overcoming cybersecurity risks.

This event is a must-attend for anyone looking to enhance their knowledge and network in the field of cybersecurity.


2.10  2024 Cybersecurity Summit

The 2024 Cybersecurity Summit is going to be one of the most attended information security events and conferences.
 
Here is an overview of it:
 
  • Who the event is for: The summit is for cybersecurity professionals, from novices to experts, looking to acquire practical knowledge and fresh perspectives.
  • Areas of specialization: The attendees and speakers are specialized in various areas of cybersecurity, including:
    • Cyber threat intelligence (CTI)
    • Digital trust
    • Audit
    • Governance
    • Privacy
    • Security
    • Emerging technologies
  • Date, time, and place: The summit is scheduled to take place from January 29 – February 5, 2024. The event will be held in Washington, DC, and also virtually.
  • Agenda and topics covered: The summit will cover a wide range of topics, challenging traditional CTI assumptions and offering new perspectives.
  • Networking opportunities: The summit provides an excellent platform for networking, bringing together cybersecurity executives and CISOs from all corners of the country.
  • GRC in cybersecurity: The sources do not specify if the event will cover governance, risk management, and compliance (GRC) in cybersecurity.

This event is a must-attend for anyone looking to stay updated in the ever-evolving field of cybersecurity.
 

3.  The 2024 Expedition: Cybersecurity and Data Protection

As we set sail on the 2024 expedition, the cybersecurity scene is more dynamic than ever. The rise of Generative AI (GenAI) is transforming operational practices, offering both challenges and opportunities. Ransomware 2.0, with its double extortion and data theft, is introducing a new level of complexity. The expanding attack surface due to the exponential growth of connected devices is amplifying vulnerabilities. Preventing cyber security incidents with the help of robust red teaming and pentesting has become more important than ever before.

Amidst these challenges, the importance of a comprehensive cybersecurity strategy that aligns with company objectives and regulatory compliance remains paramount. The journey ahead is challenging, but with vigilance and adaptability, we can navigate the evolving cybersecurity frontier. Stay tuned for the notable cybersecurity events in 2024 with rich global cyber expertise.


Spotlight

Whatsapp Inc.

WhatsApp, a Facebook company, is working on building a better SMS alternative. Because we know we can. Because someday in the very near future everybody will have a Smartphone. WhatsApp Messenger is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for SMS. WhatsApp Messenger is available for iPhone, BlackBerry, Android, Windows Phone and Nokia and yes, those phones can all message each other! Because WhatsApp Messenger uses the same internet data plan that you use for email and web browsing, there is no cost to message and stay in touch with your friends.

OTHER ARTICLES
Enterprise Identity, Platform Security, Software Security

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | August 16, 2023

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More
Software Security

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | March 22, 2024

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More
Network Threat Detection, Platform Security, Software Security

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | July 18, 2023

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | February 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

Spotlight

Whatsapp Inc.

WhatsApp, a Facebook company, is working on building a better SMS alternative. Because we know we can. Because someday in the very near future everybody will have a Smartphone. WhatsApp Messenger is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for SMS. WhatsApp Messenger is available for iPhone, BlackBerry, Android, Windows Phone and Nokia and yes, those phones can all message each other! Because WhatsApp Messenger uses the same internet data plan that you use for email and web browsing, there is no cost to message and stay in touch with your friends.

Related News

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

Platform Security

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber | January 23, 2024

Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs. Once identified, the findings are shared with Stellar Cyber automatically. Stellar Cyber’s Open XDR platform ingests, normalizes, and analyzes Proofpoint findings and other collected data to deliver a comprehensive threat picture. As security analysts conduct investigations, they can instruct integrated third-party products – including Proofpoint – on corrective actions. “Protecting organizations against email-borne attacks is a top priority, and security teams need a way to automatically correlate threat telemetry across the entire attack surface in order to quickly remediate threats,” said Andrew Homer, VP of Strategic Alliances, Stellar Cyber. “This new partnership with Proofpoint is the latest example of Stellar Cyber delivering on its Open XDR strategy to provide customers turn-key integrations that improve productivity and threat detection.” “Email attacks remain the number one entry point into an organization, and the level of sophistication of these attacks continues to grow exponentially,” said D.J. Long, Vice President, Strategic Alliances & Business Development, Proofpoint. “We’re thrilled to work with Stellar Cyber on this strategic alliance to help customers protect against advanced email-based threats and unify their cybersecurity defense.” Through this alliance, Stellar Cyber and Proofpoint give security teams an advantage over attackers, resulting in the following: Real-time threat signals exchanged for proactive detection Correlation of Proofpoint alerts across the entire attack surface Automated response actions for immediate threat containment About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Events