CISO Agenda 2015: Adding Value to a Security Program with Application Security

Veracode

The business case presented to internal stakeholders can make or break your security program.Understand why successful application security programs focus on changing development culture.How to leverage the model that one company used to demonstrate the 192 percent ROI achieved by their application security program.How to educate, rather than defend, on your ROI model with stories of culture change that drive the numbers.The path of least resistance for cyber-criminals is to attack well-known vulnerabilities in enterprise-developed applications.
Watch Now

Spotlight

Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets. This eBook looks at key dependencies among critical infrastructure sectors and how companies in these areas can stay ahead of threats and maximize their defensive efforts.


OTHER ON-DEMAND WEBINARS

See something say something: A humanistic approach to security intelligence

"Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics. Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well. In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss: • Engaging human sensors as a layer of defense • Utilizing user reports to detect malware • Real use cases of user detection within our enterprise"

Layered Security Infrastructure: Enterprise Case Studies

As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors

A Global View of the Cyber Security Threat Landscape

IBM

Nick Coleman is the Global Head of Cyber Security Intelligence Services at IBM. Previously he was National Reviewer of Security for the UK Government. He is an appointed advisor to the Executive Director of the EU Cyber Security Agency ENISA serving on the Permanent Stakeholders Group. He is an Honorary Professor at Lancaster University. He is a Fellow of the Institution of Engineering and Technology and a Fellow of the British Computer Society. He also holds an MBA with Distinction.

Data Security in 2015: Is it getting better?

Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared. With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them. All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.

Spotlight

Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets. This eBook looks at key dependencies among critical infrastructure sectors and how companies in these areas can stay ahead of threats and maximize their defensive efforts.

resources