Top Cybersecurity Trends for 2018

Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and its supporting process are increasing in number and sophistication. Traditional IT security leaders have now become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services. This webinar reviews the cybersecurity lessons learned and informs you how to use the past to create the future.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Key Functionalities of a Modern Cyber Threat Intelligence Program

Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting business objectives and allocating resources (for budget) of what the cybersecurity priorities should be? A modern CTI program needs to show value to the business because it will help solve some of the major problems we’re seeing in TI programs today (such as lack of resources or lack of data). Part of this includes bridging the gap between threat and risk to ensure your operational strategy aligns with the overall business objectives.
Watch Now

Register for the Nautilus cyber-security webinar

Nautilus

Cyber-security is an increasing challenge for the shipping industry and Nautilus is stepping in to help members by co-hosting a special training webinar for seafarers in September. With high profile ransomware attacks on shipping companies such as Maersk and COSCO, operators are under pressure to improve their cyber-security and to develop improved measures to protect their systems from attack. However, there is evidence that many companies are not doing enough to educate seafarers about the risks of cyber-attacks or how to avoid them. Research by Nautilus showed that 86% of crew had never received any cyber security training from their employers. The Union is teaming up with security experts Appsecco and their specialist maritime division ShipSecure, to hold a webinar to raise awareness of cyber security issues onboard.
Watch Now

How to Build and Implement your Company’s Information Security Program 2021

Data is one of your business’s most valuable assets and requires protection like any other asset. How can you protect your data from unauthorized access or inadvertent disclosure? An information security program is designed to protect the confidentiality, integrity, and availability of your company’s data and information technology assets. Federal, state, or international law may also require your business to have an information security program in place.
Watch Now

Cyberthreats in the Internet of Things

Hlmediacomms

On July 16, 2019, Nathan Salminen, Allison Holt, and Paul Otto from the Hogan Lovells Privacy and Cybersecurity and Litigation teams presented a webinar, “Cyberthreats in the Internet of Things” where they explored some techniques that can be used to exploit potential vulnerabilities in connected devices and how those types of events impact organizations from a regulatory and litigation perspective. Many of the nearly 20 billion Internet of Things (IoT) devices deployed worldwide perform critical functions or have access to networks that process highly sensitive information. The proliferation of connected devices across industry sectors has led to the emergence of a significant and distinct threat to many types of organizations, from electric utilities deploying IoT devices across its smart grid to financial institutions using IoT devices in conference rooms that may connect to the same network that financial data flows through.
Watch Now