Security in 2015 - What awaits us?

"For our first webcast of 2015, we will look back at the various predictions made by the industry’s top thinkers, and the stories that made 2014, to get an idea of what awaits us in the new year.

2014 saw point of sale systems consistently attacked by malware that was freely available on the underground web, ransomware scare consumers and businesses and stories on attacks against Sony Pictures and Target among those dominating the national news.

With this in mind, and things only likely to get worse, we will be joined by industry speakers Tom Cross and Martin McKeay, and leading analyst Richard Stiennon to look at the year that has passed and what we have learned, and what the year ahead presents for cyber security. We will also look into the collection of predictions, and ask what purpose they serve, who they benefit and what they offer for you.

Join us at 4pm GMT on the 6th January for a lively debate for some crystal ball gazing on what we think will make the headlines in 2015, and whether we will be reading about the same problems as before"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cut Your Cybersecurity Risk with an Industry-Leading Password Safe

While compromised passwords remain the top cause of breaches and attacks, working from home and leveraging new tools has resulted in an explosion of new, decentralized employee passwords outside of the enterprise applications onboarded to your identity and privileged access management program. This shadow IT creates significant cybersecurity risk for your company with hundreds of employee passwords, secrets, and files shared in chats and texts, stored in spreadsheets, and saved on sticky notes. Or worse, passwords are reused across personal and corporate accounts on the internet.
Watch Now

Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now