"State of the Hack: Nordics"


"In this webinar we will be drawing on the findings from our recent report, Cyber Threats to the Nordic Region.

Watch now to learn about:

•Some of the specific threat activity we have observed against Denmark, Finland, Iceland, Norway, and Sweden
•Attacks on Critical Infrastructure in the Nordics
•The motivations and drivers of future threat activity in the Nordics
•How to respond to advanced attacks"
Watch Now


Leading security companies like Kaspersky Lab play a powerful role in contributing to the mission of building our future generation of cyber professionals by converting one of your technologies or solutions into an experience that is featured on the LifeJourney platform


Threat Detection, Compliance & Incident Response


Combining and correlating data to meet specific regulatory compliance requirements can prove cumbersome for financial institutions. Combining that data along with real-time threat detection and analysis, and working it into an incident response plan, can prove nearly impossible. How to detect, in real-time, a variety of threats by managing logs, events, databases, and applications; Preparing an incident response plan based on advanced analytics and detailed forensics; Reducing the manual processes many financial institutions go through when trying to convey compliance with industry regulations.

"Fighting Cyber-Attacks Through Security Intelligence"

"Security teams are bombarded with information that could indicate a potential threat to the organization – but identifying the real dangers within the sea of digital noise is a constant challenge. The ability to reduce noise and attain true visibility into actual threats facing your organization is often referred to as ‘security intelligence’. By achieving security intelligence, teams can reduce the time taken to detect and respond to cyber-attacks and properly assess risk. Leveraging your security intelligence is a complex but incredibly valuable process. It’s worthwhile though – proper insight into the data traversing your network could be the difference between stopping a breach and falling victim to the next headline-grabbing attack. In this webinar, a panel of experts will discuss what ‘security intelligence’ really means, and how security teams can apply it. Join the debate by asking your questions of the panel, as they explore: *How to achieve visibility and deliverable intelligence into malicious network activity *Applying contextual information to enhance the quality of security intelligence *Achieving automation and efficiency *The response lifecycle "

Rethinking Email Security: Best Practices to Protect and Maintain Private Communications

HP Security Voltage

2014 has been called “The Year of Encryption.” The recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It’s the easiest mode of communication which also makes it an easy target for data theft.Best practices for securing sensitive email communications.When is the right time to replace your legacy email security.

The Magnificent Seven – Best Practices for Cloud Security

"If you’re using or considering cloud, you should also be considering security in the cloud. Join our webinar where we will talk through seven practical best practice ideas for ensuring security in any cloud environment, from securing code and creating access management policies to understanding your cloud providers security model and where you need to assume security responsibility. We will explore real-world data about security incident threats identified in Alert Logic’s Cloud Security Report. This will help you understand the types of attacks happening in the cloud today, how the threat landscape has evolved as cloud adoption has accelerated in the last several years, but also how you can secure your organisation and avoid them."