Grow Your Own...Social Engineering, Corporate Culture and the Insider Threat

Organisations of all sizes and types unwittingly, but actively, assist both Social Engineering and more technical attacks on their businesses through their own corporate culture, habits and management style.  Whether it be through a management style of arrogance or bullying, through poor supplier management or through the naiveté that comes with having plentiful resources & being a household name, firms are encouraging external attacks and growing their own risk of internal threats, primarily through having the wrong attitude and organisational behavioural traits.  In this webinar, Social Engineer and People Hacker, Jenny Radcliffe explains why this is the case and discusses what organisations can do to adapt their culture in order to repel, rather than attract, the attackers.
Watch Now

Spotlight

2016 Cyber Security Intelligence Index infographic for Financial Services. There’s very little that cyber criminals can do today that’s truly new—and yet, 2015 was filled with serious incidents across the entire industry. The annual IBM® X-Force® Cyber Security Intelligence


OTHER ON-DEMAND WEBINARS

7 Most Critical IT Security Protections Every Business Must Have In Place Now To Protect Themselves From Cybercrime, Data Breaches And Hacker Attacks.

82,000 NEW malware threats are being released every day, and businesses (and their bank accounts) are the #1 target. To make matter worse, a data breach exposing client or patient information can quickly escalate into serious reputational damage, fines, civil lawsuits and costly litigation. If you want to have any hope of avoiding a cyber-attack, you MUST read this report and act on the information we're providing.The #1 threat to your business that even the BEST firewalls and anti-virus software can't protect against (and what you need to do now to remedy it).The biggest security risks with cloud computing and what you need to do to stay safe if you're going to store client data, confidential data and financial information in the cloud.The biggest security risks with cloud computing and what you need to do to stay safe if you're going to store client data, confidential data and financial information in the cloud.How to keep your network secure with the proliferation of mobile devices, cloud applications, e-mail, and social media sites connecting to your computer network.

When Prevention Fails...

"When prevention fails, your only hope is detection. Security defense plans are relying on detection and response knowing preventive defenses are declining in effectiveness. The balance between preventive and detective defenses is the big security shift for 2015, and knowing the process cycles, skills and technologies is vital for success. Detection and response is more than a point solution, learn the four phases for detection on your network in this webcast. - Four detection phases for your network - Integrating key technologies required for detection - Processes to mine big data for actionable intelligence - Detection skills sets, costs and resource requirements - Analyzing all the data all the time, options for success"

The New School of Cyber Defense

"The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data. The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run)"

Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime

Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security