The Dark Side of Anonymizers: Protect Your Network from the Unknown

While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Watch Now

Spotlight

The present paper focuses on Security Awareness Campaigns, trying to identify factors which potentially lead to failure of these in changing the information security behaviours of consumers and employees. Past and current efforts to improve information security practices have not had the desired effort. In this paper, we explain the challenges involved in improving information security behaviours. Changing behaviour requires more than giving information about risks and correct behaviours – firstly, the people must be able to understand and apply the advice, and secondly, they must be willing to do – and the latter requires changes to attitudes and intentions. These antecedents of behaviour change are identified in several psychological models of behaviour (e.g. theory of reasoned action, theory of planned behaviour, protection motivation theory). We review the suitability of persuasion techniques, including the widely used fear appeals. Essential components for an awareness campaign as well as factors which can lead to a campaign’s failure are also discussed.


OTHER ON-DEMAND WEBINARS

Cyber Information Sharing and Public Policy

The US Senate is currently debating a vote on its thirteenth major cybersecurity information sharing bill. It is important to understand why the government is being so persistent pursuing such policy and why the previous twelve bills have failed. The reasons to pursue such a bill can be compared to the reasons that we have a Centers for Disease Control and a World Health Organization: in order to gather and correlate enough data that we can detect trends and prevent the spread of infection. The reasons that the bills have all failed focus primarily on privacy, liability, and a suspicion of government surveillance.This webinar will examine the case on both sides of this debate, and will provide the current state of proposed legislation at the state and federal levels. We will then discuss emerging models of information sharing organizations and propose a private model that is gaining popularity and acceptance.
Watch Now

"Securely Migrating to the Public Cloud"

"Making the move into the public cloud and unsure of all the steps involved? Register now for this complimentary webinar, where cloud and security experts from 2nd Watch and Alert Logic will outline best practices for migrating and securing your data in the cloud. Three things you will leave the webinar with: 1. Tips on how to successfully and efficiently migrate to AWS 2. Insights into how to build a scalable and secure cloud infrastructure on AWS 3. A better understanding of which security threats are prevalent in cloud environments"
Watch Now

Maintaining Operational Security in Today’s Ever-Changing Landscape

Our Cyber world is constantly evolving and becoming more challenging almost on a daily basis. So if your Network and operating systems are secure one week, they might not be the next. Thus, we have the concept of Operational Security (OpSec) which is a combination of multiple domains principles, yet applied on a constant basis. Operational Security applies to everything that affects your network, computers and operation systems, applications and everything else that keeps you systems functional and operating. It encompasses people, equipment, policies and planning to confirm that all have proper and necessary access to the data needed to preform, as well as monitoring and auditing this environment to make sure that every thing is functioning “according to Hoyle”. This workshop will focus on those concepts, knowledge and practices that will allow you, as a Cyber Security Professional to maintain OpSec as one of your assigned duties.
Watch Now

"Before the kill chain: What attackers are doing and how you can spot them"

"Attackers can't hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers. What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins? Join our webcast with Guest Speaker, Forrester Research, Inc. Principal Analyst, Rick Holland and Dan Hubbard, OpenDNS Chief Technology Officer, to hear more about: What attackers do before the kill chain How you can spot their activity How you can leverage this information to stay ahead of attacks "
Watch Now

Spotlight

The present paper focuses on Security Awareness Campaigns, trying to identify factors which potentially lead to failure of these in changing the information security behaviours of consumers and employees. Past and current efforts to improve information security practices have not had the desired effort. In this paper, we explain the challenges involved in improving information security behaviours. Changing behaviour requires more than giving information about risks and correct behaviours – firstly, the people must be able to understand and apply the advice, and secondly, they must be willing to do – and the latter requires changes to attitudes and intentions. These antecedents of behaviour change are identified in several psychological models of behaviour (e.g. theory of reasoned action, theory of planned behaviour, protection motivation theory). We review the suitability of persuasion techniques, including the widely used fear appeals. Essential components for an awareness campaign as well as factors which can lead to a campaign’s failure are also discussed.

resources