National Cybersecurity Awareness Month 2017

CIS

National Cybersecurity Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join Michael Kaiser, Executive Director of the National Cyber Security Alliance, and Princess Young, Program Lead, National Cyber Security Awareness Programs of the Office of Cybersecurity & Communications for the U.S. Department of Homeland Security for a deeper dive into NCSAM. Learn why securing the internet is our shared global responsibility and how you can get involved. Michael will be discussing weekly themes, free collateral, events, the NCSAM Champion program, STOP. THINK. CONNECT.™ partnership and more.
Watch Now

Spotlight

The most memorable quote from today's guest is that IT is Obsolete. Professor Andre Hinton who also works as a cyber Lead for the United States Air Force talks about the trend in acquisitions for cyber products within the leading agencies in the United States Government. He says when proposals come to them for any communications project that do not have Cyber Security as top priority, they go straight to the bottom of the stack. Our Government agencies have shifted their paradigm and now place Cyber Security as number one priority on their mission list.


OTHER ON-DEMAND WEBINARS

5 Questions to Ask Your Software Provider About Cybersecurity

Synopsys Inc

Congratulations! You’ve taken the first steps to get that great IoT idea of yours into production. You’ve even hired a team of engineers to build out your dream. But in the rush to market, security (and software security in particular) cannot be an afterthought with IoT. Unlike a server crash in an enterprise environment, failure of an IoT device or component can result in direct physical harm. Think of medical devices. Or connected cars. Or industrial control systems. So, are you doing all you can to make sure your software does not contain weaknesses and vulnerabilities that could bite you later on down the road? In this talk I'll discuss the need for software testing, early and often, both known and unknown vulnerabilities. Not only for the code you create in house, but also for the code you adopt from outside sources -- up to 90% can come from sources outside of your control. Topics covered include static analysis, fuzz testing, software composition analysis, interactive application security testing, and test optimization.

Security? It’s All About Risk and How to Manage It

Information Security Forum

Given today's complex threat landscape, a standard approach to information security has become a way of the past. Resilience is the new way forward and organisations require a resilient security strategy that is not just robust, but also flexible. To achieve this, organisations need take a risk management based approach to operating in cyberspace. This approach will not only help to minimise risk and prevent reputational damage right now, but will also allow the adoption of a more resilient approach to risk management as the threat landscape continues to evolve. This webcast examines the three key stages that security leaders need to go through in adopting such a risk based approach and provides insight and guidance on how this may be successfully achieved.

Cyber Threat Intelligence

Collecting security and fraud related data from multiple sources can often just result in creating a very large pool of unrelated facts. But, begin to add context to that data and you now have information. Triangulate multiple pieces of information together and you can create intelligence.

"How to Leverage Threat Intelligence for Every Day Defense"

Alienvault

"As malware becomes more commercialized, attackers are leveraging the same attack kits again and again. Threat intelligence offers the ability to detect attacks carried out using methods previously reported by others. But, only if it can be effectively integrated into security controls & processes. For IT security teams considering integrating threat intelligence, what are the first steps to get started? Join AlienVault for this practical session covering: How to evaluate threat intelligence sources How to get started with threat intelligence How to simplify the integration of threat intelligence into your daily operations Practical use cases for mid-market organizations "

Spotlight

The most memorable quote from today's guest is that IT is Obsolete. Professor Andre Hinton who also works as a cyber Lead for the United States Air Force talks about the trend in acquisitions for cyber products within the leading agencies in the United States Government. He says when proposals come to them for any communications project that do not have Cyber Security as top priority, they go straight to the bottom of the stack. Our Government agencies have shifted their paradigm and now place Cyber Security as number one priority on their mission list.

resources