Why InfoSec Professionals Must Understand Privacy Issues

In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.Saying that an organization has a privacy professional is clearly an insufficient answer for managing the risks associated with data in today's enterprises,he says in an interview with Information Security Media Group."What we are seeing across the board in the marketplace is that anyone who touches data is a risk vector when it comes to privacy.
Watch Now


Learn how Trend Micro’s Connected Threat Defense can improve an organizations security against new, 0-day threats by connecting defense, protection, response, and visibility across our solutions.  Automate the detection of a new threat and the propagation of protections across multiple la


Top 5 Reasons Data Breaches Keep Occurring

"James Hanlon, Security Strategist at Symantec breaks down the Top 5 reasons that cyber attacks and data breaches continue to happen, and more importantly, gives his suggestions for how you can reduce the risks to your organisation."

Bad Rabbit Ransomware: What you need to know to stay safe

Zscaler, Inc.

A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been monitoring the outbreak and has pulled together all the latest information about the attack.

Building and Scaling a Malware Analysis System

Software Engineering Institute

Building and Scaling a Malware Analysis System. This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade.For nearly 15 years, the SEI has been collecting malware samples into the CERT Artifact Catalog and analyzing them. This webinar describes some of the issues involved in automating the collection and analysis of malware, which has seen exponential growth over the past decade. It also discusses how scaling up systems to support this growth compares to approaches for scaling up the number of users at high-traffic sites.

Social media and email phishing: How to protect financial information from fraudsters

Channel Futures

Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.