Top 5 Challenges, Beyond APTs, to Securing Industrial Control Systems

Like everyone else, providers of critical infrastructure are concerned about the increasing sophistication and success of Cybercriminals/Advanced Threats. However in addressing this security risk, they have additional complicating factors to address. These include:Inaccessible locations.
Watch Now

Spotlight

The new Gartner case study highlights how an organization utilized NAC and mobile device management solutions to establish policies for enabling a BYOD environment with an acceptable level of risk.


OTHER ON-DEMAND WEBINARS

"The Changing Role of the Chief Information Security Officer"

Veracode

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.

Learn the Ins and Outs of a Security-Aware Culture from a Forrester Expert

MediaPRO

Developing and maintaining a security-aware culture in an organization has become vital in the defense against modern cyberthreats. But such a culture cannot be expected to develop overnight. Building such a culture is a journey, not a miracle, with many pitfalls along the way. That’s why we’re here to help. Watch our on-webinar Harden the Human Firewall by Building Awareness, Behavior, and Culture, with MediaPRO Chief Learning Officer Tom Pendergast guest speaker Forrester analyst Jinan Budge to learn how to instill a culture of security through an engaging, meaningful, and even entertaining security awareness program.

A Game of Cat and Mouse: Malware Evasion Techniques

"Understanding the techniques used by malicious actors to avoid detection, from modern botnet evasion techniques to hijacking commercial CSPs in order to host malicious content. This presentation looks at the innovation from the side of the attacker, and the response from industry to meet these new technical challenges. Raj is currently working as the VP, Chief Technical Officer for McAfee EMEA, having previously worked as the CISO for a large public sector organisation in the UK. He volunteers as the Cloud Security Alliance EMEA Strategy Advisor, is on the advisory councils for Infosecurity Europe, and Infosecurity Magazine. In addition, Raj was previously the Vice President for Communications in the ISSA UK Chapter, having presided over the award for Chapter communications programme of the year 2008, and 2009. He has had numerous security papers published, and appeared on television (ITV and More4). As well as providing assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3). Raj is also the author of the upcoming book 'Applied Cyber Security and the Smart Grid' "

"Unsharing your Data: What’s the Cloud Impact on your Business?"

In this webinar, we will show with concrete examples why it is so important to implement correct user and data security controls to secure your cloud and virtual environments. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. This presentation will stress the importance of using data and user centric security models vs. conventional data security practices. Join (ISC)² and Gemalto-Safenet in this webinar to learn what we call: unsharing your data