Infosecurity 2016: Big Data Security Analytics in Cyber Warfare

Splunk

BrightTALK got the chance to spend some time with Splunk's lead security evangelist, Joe Goldberg at Infosecurity. Joe broke down key topics such as the cyber security risks faced by financial institutions and the developments that they could make to better protect themselves; the rise of nation-state attacks and cyber warfare and what Splunk are most excited about in the world of information security - big data security analytics.
Watch Now

Spotlight

Information security is often categorized as simply computer security. Rather, information security is more correctly categorized as aligning business goals and risk. Information security acts as an umbrella over all organizations within a business to correlate seemingly disparate business risks and provide executive leadership with actionable information. Information security includes computer and network security, but that encompasses a small part of the overall risk to the business. Information security must also integrate into business goals, company policy and procedures, physical security and third party audits.


OTHER ON-DEMAND WEBINARS

Risk-Based Security Testing

"Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results. Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics"
Watch Now

Investment Firms need a Cyber-secure Corporate Culture

Protecting client and company data from cyber breach should be a critical operations objective for Investment Advisory firms today. The risks reach beyond unsuspected internal hacks to software and servers, while cloud computing adds an additional layer of threat. Addressing procedures for protecting data as a corporate culture increases the chances of survival in the ever evolving cyber hack landscape.Attackers use advanced skills and weapons to organize assaults. Long-term cyber attack strategists sneak in to systems and gather information for later use. Other criminals look for easy targets where they can steal money and disrupt business; including holding websites and proprietary data for ransom. Financial industry firms are particularly vulnerable to Web-App attacks and DoS (denial of service), as well as Insider threats.Many RIA firms have not yet become adept at developing sound cyber security tactics. They leave themselves and their clients at risk for sudden loss of information, embarrassment, and unforeseen recovery costs. The first step in creating a cyber security strategy should be a comprehensive evaluation of risk and education of threats that exist.
Watch Now

"The Internet of Things, the Software Supply Chain and Cybersecurity"

Veracode

As enterprises increasingly rely on connected devices, CISOs and CIOs should understand the critical implications of cybersecurity for the Internet of Things (IoT). Join Chris Eng, VP of Research at Veracode; Josh Corman, CTO of Sonatype; and DarkReading moderator Eric Ogren for a live-streaming videocast discussing how IoT changes how we develop applications and assess them for risk.
Watch Now

Five Steps to a Zero Trust Network - From Theory to Practice

"A Zero Trust network abolishes the quaint idea of a “trusted” internal network demarcated by a corporate perimeter. Instead it advocates microperimeters of control and visibility around the enterprise’s most sensitive data assets and the ways in which the enterprise uses its data to achieve its business objectives. In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester Research, and Nimmy Reichenberg, VP of Strategy at AlgoSec will explain why a Zero Trust network should be the foundation of your security strategy, and present best practices to help companies achieve a Zero Trust state."
Watch Now

Spotlight

Information security is often categorized as simply computer security. Rather, information security is more correctly categorized as aligning business goals and risk. Information security acts as an umbrella over all organizations within a business to correlate seemingly disparate business risks and provide executive leadership with actionable information. Information security includes computer and network security, but that encompasses a small part of the overall risk to the business. Information security must also integrate into business goals, company policy and procedures, physical security and third party audits.

resources