"Getting to Grips with Cyber-Security"

The majority of organisations across Europe and UK now accept that targeted attacks are a serious problem. Quocirca’s presentation reviews recent research into the perception of cyber-threats, the impact they can have and the before, during and after measures organisations are putting in place to protect themselves against them. The presentation includes a preview of new research to be published in December 2015
Watch Now

Spotlight

Hackers Are Exploiting Your Company’s Weakest Links: Social Engineering Explained The Five Most Common Social Engineering Attack Types. Pretexing The practice of impersonating or fabricating an identity in order to obtain sensitive information from a target. Tailgating is the physical act of a


OTHER ON-DEMAND WEBINARS

Extend enterprise application-level security to your AWS environment

"It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves. This webinar will: · Discuss inherent AWS security capabilities · Review attack types that target the applications and why traditional security approaches can’t stop them · Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud "

"The Data Magician – Real time insight into unstructured data"

Veritas

As information continues to explode and the growth of unstructured data surpasses structured data, organisations are arriving at a critical decision point: simply purchase more storage or implement a strategy to gain control of their data. Darren Locke explains how metadata can be used to provide an immersive visual experience via the Veritas Information Map, helping optimise storage and reduce information risk.

IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly

"2014 brought significant change for the internet security industry. According to IBM's latest X-Force report: - Over 1 billion records of PII were leaked in 2014 - Vulnerability disclosures rocketed to a record high in 2014, and designer vulns like Heartbleed and Shellshock revealed cracks in the foundation of underlying libraries on nearly every common web platform - Crowd-sourced malware continues to mutate, resulting in new variants with expanding targets - App designer apathy is negatively impacting security on mobile devices. Join (ISC)2 and IBM to learn more about the findings of the latest IBM X-Force report and X-Force Interactive Security Incident website, designed to help users gain in-depth understanding of security breaches publicly disclosed over time."

Malware Activity & Network Anomaly Detection

As the weapon is installed and begins to utilize mechanisms, such as remote access Trojans or backdoor channels to become resident, it will leave a trail of threat indicators. Certain malware focused anomaly detection solutions can recognize these indicators helping to facilitate a response, while mechanisms such as Application Whitelisting could prevent the malware from running in the first place. We will discuss both in this session. Should such mechanisms fail, the weapon attempts to establish command and control communications, as it does so it will produce valuable network - level threat indicators facilitating its detection and appropriate response.