Convergence of Cybersecurity & BCM: Cyber-Attack Planning and Response

Metrics Stream

As data breaches and cyber attacks continue to increase in frequency and severity, cybersecurity resiliency has become imperative to an organizations success.A cyberattack can result in operational disruption of critical business processes and impact day-to-day functions of the business, increasing the need for business continuity management in cybersecurity planning and response. An effective response will be dependent upon the ability of the organization to communicate during the situation and collaborate in real-time to mitigate the effects. Such a response requires continuous investment in conducting joint IT and BCM training exercises.
Watch Now

Spotlight

"Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. In the Definitive Guide to Next-Generation Threat Protection, Steve Piper, CISSP, dissects today's new breed of cyber attacks and how to fill the gap in network defenses in the battle against them."


OTHER ON-DEMAND WEBINARS

The Fine Line: 2016 Trend Micro Security Predictions

Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.

"Avoiding a Breach with Security Analytics and Automated Response"

"In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident."

Security Lessons Learned from Target, Niemen Marcus, Sony and Other Breaches

"With major data breaches on the rise, it’s hard to deny that they've become a common occurrence in the security threat landscape. Large companies such as Target, Nieman Marcus and Sony (among others), have suffered major data breaches in the past year. As security professional, it is important to understand why and how these organizations were breached so you can learn from what was done right, what worked and what didn’t. In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, will discuss lessons learned from recent breaches. By analyzing the available information about recent data breach incidents from the perspective of detection, Smith and Ingleby have assembled a list of security monitoring lessons and ideas."

Insider Threats - Safeguarding Financial Enterprise Information Assets

Information Security Media Group

Societe Generale being a prime example - in a business environment, 32% of all fraud and theft is perpetrated by trusted employees, enforcing and monitoring employee access to information assets is critical. In fact, it is not only critical, it is also a legal requirement in a growing number of government regulations and industry mandates.

Spotlight

"Despite the over $20 billion invested in IT security technology last year, countless enterprises and government agencies have fallen victim to cyber attacks of incredible sophistication and complexity. In the Definitive Guide to Next-Generation Threat Protection, Steve Piper, CISSP, dissects today's new breed of cyber attacks and how to fill the gap in network defenses in the battle against them."

resources