Emerging Threats for 2016

Information Security Forum

As we move into 2016, attacks will continue to become more innovative and sophisticated. Unfortunately, while organizations are developing new security mechanisms, cybercriminals are cultivating new techniques to evade them. In the drive to become cyber resilient, organizations need to extend their risk management focus from pure information confidentiality, integrity and availability to include risks such as those to reputation and customer channels, and recognize the unintended consequences from activity in cyberspace. By preparing for the unknown, organizations will have the flexibility to withstand unexpected, high impact security events.During this webinar, Steve Durbin will discuss the top five global security threats identified by the ISF for 2016. These include: the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industry.
Watch Now

Spotlight

Although the industry acknowledges that advanced malware attacks require new and innovative solutions to detect and remediate, far too many organizations default to focusing the entirety of their efforts on detection, whether traditional endpoint protection suites or new "silver bullet" defenses. That is a sure path to failure, as the industry continues to witness with each front-page data loss and breach story.


OTHER ON-DEMAND WEBINARS

Security and Governance in the Hybrid Multi-Cloud

Saviynt

Hybrid cloud solutions are hailed for their combination of scalability, agility and cost-efficiency of public cloud with the increased security and compliance of keeping sensitive data on-premises under your full control. However, the responsibility for security is shared between the customer and the provider and, importantly, the need for overall governance and compliance with laws and regulations remains with the customer.
Watch Now

10 Things to Test Before Buying Your Next-Generation Firewall

ISACA

How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just application and user based security policies. In this webinar, we will share the 10 capabilities to test before you buy your next-generation firewall, and the top 5 mistakes to avoid.
Watch Now

"Applying Actionable Threat Intelligence to your Vulnerability Management Program"

This live webinar will showcase how Qualys and Kenna together connect an organisation’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management. Attendees will learn strategies for applying actionable threat intelligence to their vulnerability management programs
Watch Now

How to Survive the Top 10 CyberSecurity Risks of 2016

TrustNet

2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10 CyberSecurity Risks of 2016 and provide practical guidance on how to outmaneuver, outduel, and outlive. our adversaries.
Watch Now

Spotlight

Although the industry acknowledges that advanced malware attacks require new and innovative solutions to detect and remediate, far too many organizations default to focusing the entirety of their efforts on detection, whether traditional endpoint protection suites or new "silver bullet" defenses. That is a sure path to failure, as the industry continues to witness with each front-page data loss and breach story.

resources