Financing Security: How M&As and the Markets Are Shaping the Security Industry

SIA

Attend the unique SIA webinar “Financing Security: How M&As and the Markets Are Shaping the Security Industry” to learn more about the impact of the 2018 deals that brought together Amazon and Ring, ADT and Red Hawk, Motorola and Avigilon, Securitas and Kratos, and many others. In addition, this webinar will examine the debt capital markets, equity capital markets, emerging market trends and other financial components of the security industry, while providing a look ahead to the rest of 2019.a
Watch Now

Spotlight

The open web is both a platform to create attacks and a source of information to prevent attacks. To shift the balance of power in your favor, our revolutionary technology organizes the public web for analysis to provide you future, present, and past insight for emerging cyber threats. Our Temporal Analytics™ Engine structures data around cyber security events, actors, locations, and time to give you forecasting power.


OTHER ON-DEMAND WEBINARS

'Reeling in the Year' – Looking Ahead to 2015

"2014 is in the bag and what a year it was - for the hacker and cybercriminal community that is. 2014 was full of high profile data breaches and significant new vulnerabilities, some of which affected the very core of the online world. This session will combine looking back at 2014’s key events and a good dose of Fortinet’s cyber crystal ball to come up with some predictions for what we can expect during the upcoming 12 months"

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations

IBM

Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it. Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the horizon. California’s passing of the California Consumer Privacy Act of 2018 (CaCPA) on June 28 and adoption of a set of amendments to the law in September has proven to be a strong catalyst for a new focus on data security.

Copyright Regime vs. Civil Liberties

"The copyright monopoly debate has gotten exactly nowhere since the days of Napster. There's still a copyright industry that insists on control of the net in the name of lost profits. But what does this do to the net? More to the point, why are we letting a literal cartoon industry have any say at all in regulation of our most important pieceof infrastructure? In this presentation, Rick Falkvinge, founder of the Swedish and first Pirate Party, examines how the entire copyright industry position is ared herring, which is (or should be) completely irrelevant to policymaking on net issues. He brings up the concept of AnalogEquivalent Rights, and painfully points out that some of the most crucial civil liberties of our parents are currently not being passedon to our children, because doing so would interfere with profits ofentertainment companies. There's nothing wrong with profit as such. But no entrepreneur should get to dismantle civil liberties just because they can't make moneyotherwise."

Threat Protection: how does the growing threat landscape affect you?

"If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years. Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business. On this webcast we will cover; •The main security challenges and trends in 2014 •Highlight how threats operate to allow you to better informed •Key takeaways for executive / functional leaders"

Spotlight

The open web is both a platform to create attacks and a source of information to prevent attacks. To shift the balance of power in your favor, our revolutionary technology organizes the public web for analysis to provide you future, present, and past insight for emerging cyber threats. Our Temporal Analytics™ Engine structures data around cyber security events, actors, locations, and time to give you forecasting power.

resources