IFAC TAG Webinar on Cyber Security

IFAC

In today’s digital age, many people have at some point wondered whether their online accounts have been compromised or have been part of a large data breach. Like a lot of the issues that make the news on a regular basis, we can become desensitized to cyber risks, but it is imperative, especially for organizations of all sizes, to be vigilant and educate their employees and stakeholders on proper protocols and procedures for minimizing risk. Accounting professionals are in a unique position to address cybersecurity.
Watch Now

Spotlight

IT security concerns you. In fact, like it or not, it concerns everybody, however sceptical they may be. Theft of hardware or data, virtual identity theft, and even surveillance of online activity, are no longer crimes to which only celebrities fall victim, but ones which may be perpetrated against any one of us. As key players at a reputable Swiss ecole polytechnique, we all have a duty to be aware of the risks in terms of internet security, and to know how to react when faced with the increasing number of threats, virtual or otherwise, to which we are exposed.

OTHER ON-DEMAND WEBINARS

Trends in Privacy and Data Security

Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a special focus on the GDPR, Brexit, and the
Watch Now

Inside the Front Lines of Cyber Defense

Alert Logic

A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.
Watch Now

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

Threat Hunting Reimagined

Devo

Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and prevent the analyst from doing what they do best - hunt threats. Join our webinar and see firsthand how threat hunting teams can realize their full potential. With Devo, threat hunters can: Analyze real-time streaming and historical data at petabyte scale.
Watch Now

Spotlight

IT security concerns you. In fact, like it or not, it concerns everybody, however sceptical they may be. Theft of hardware or data, virtual identity theft, and even surveillance of online activity, are no longer crimes to which only celebrities fall victim, but ones which may be perpetrated against any one of us. As key players at a reputable Swiss ecole polytechnique, we all have a duty to be aware of the risks in terms of internet security, and to know how to react when faced with the increasing number of threats, virtual or otherwise, to which we are exposed.

resources