UNDERSTANDING THE GAME CHANGER – CYBER THREAT INTELLIGENCE

The frequency and severity of cyber attacks are on the rise as cyber criminals adapt their methods of attack for maximum profit: from adopting a mass-market approach for compromising as many organisations as possible, through to more sophisticated attacks that target specific companies.  This is why building a cyber security strategy that has data-driven threat intelligence at its core is so critical.In this session, Martin Lee, Intelligence Manager, Alert Logic discusses why a cyber-threat intelligence capability is so critical, share insights into current threat vectors and how threat intelligence should be integrated into your cyber-security strategy to help countering threats.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Solving for Compliance and Zero Trust with Istio Ambient Mesh

Istio ambient mesh uses a sidecar-less data plane that focuses on ease of operations, incremental adoption, and separation of security boundaries for applications and mesh infrastructure.
Watch Now

TW-NL Cyber Opportunity Webinar

In the era of globalization, as the international division of labor goes deeper, the industrial development shifts from “manufacturing economy to service economy” and “from hardware manufacturing to soft manufacturing.” The manufacturing industry aims to enhance its international competitiveness with the added value created by the service industry. As a major producer of global ICT products, Taiwan plays an important role in the security industry supply chain during the China-U.S. trade war. It is high time Taiwan develops “Internet of Things Security” and “Secure Internet of Things” with its complete semiconductor industry supply chain. To grasp this opportunity, Taiwanese manufacturers are striving to become not only product suppliers but also cyber security solution providers by taking advantage of the global cyber security research and development. By offering products with distinguishing cyber security functions to customers based on their needs, Taiwanese manufacturers are expecting to create higher added value.
Watch Now

The Current State of Cybersecurity is a 24x7x365 Game

Alert Logic

The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats, you need to leverage software plus services to augment your security team and capabilities.
Watch Now

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now