Developing & Testing an Effective Incident Response Program Date: Dec 22, 2016 View webinar If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, and downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan, and how to test and practice that plan so that you're ready for the real thing.
Collecting & Using Threat Intelligence Data Date: Dec 15, 2016 View webinar The good news in IT security is that there is a growing list of resources and services that can inform you about the latest threats in cyber space. The bad news is that with so many sources and data, using threat intelligence to improve your cyber defenses can be a bewildering process. In this session, you'll get a look at some of the different types of threat intelligence data, and you'll get advice on how to choose the right ones - and integrate the information to improve your defenses.
Detecting and Mitigating Targeted and Sophisticated Attacks Date: Dec 08, 2016 View webinar In the past, most cyber attacks simply exploited the most vulnerable systems. Today, however, there is an increasing number of sophisticated attacks that target specific companies, data, or even employees. These attacks are well-disguised and may escape conventional security defenses. What tools and strategies are there to prevent these exploits? In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.
The Impact of a Data Breach Date: Dec 01, 2016 View webinar To understand the cyber risk your organization faces, you need to understand the likelihood of a breach - and its potential cost. In this session, a top expert discusses the many - and sometimes hidden - costs of a data breach, including its impact on customers and end users. You'll also get insight on the frequency of data breaches, and a better understanding of how likely it is to happen to you.
Resilient Security Monitoring: One Step at a Time Date: Nov 17, 2016 View webinar Your security architecture was designed to protect your business, but does it have the resiliency to deliver results in the event something doesn't go as planned? Can you maintain network availability and full security inspection during component outages and planned upgrades, or recover instantly from catastrophic failures? Resiliency is attainable - even on a budget - when you take it step by step.
Who Are the Bad Guys? Understand Cyber Criminals & Their Motivations Date: Nov 17, 2016 View webinar Another key element in assessing risk is assessing your attractiveness as a target. Today's cyber attackers range from financially-motivated criminals to politically-motivated hacktivists to state-sponsored information-gathering hacker units. This session offers a look at the different types of cyber attackers, their methods, and their motivations.
Simplify Security & Management of Office 365 Date: Nov 17, 2016 View webinar If your organization is moving to Office 365, you're facing the challenge of dealing with identity management and end users accessing Office applications and corporate data from potentially insecure devices. Yet these challenges in endpoint security can be managed by simplifying the Office 365 deployment and implementing secure controls to protect sensitive information.
How to Get Cloud Security into Your Budget Date: Nov 16, 2016 View webinar If you've made the move to the cloud, you're facing new security risks - and you may not have budgeted for a solution that will secure your entire cloud footprint. In order to secure all of your cloud services, you and your team must make a bulletproof business case to include cloud security in your budget.
DarkReading Virtual Event: Re-Thinking IT Security Strategy Date: Nov 15, 2016 View webinar Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today's approach to data defense isn't where it needs to be and it's time for all enterprises, including yours, to re-think enterprise IT security. This all-day virtual event will offer an in-depth look at some of the myths surrounding enterprise data defense - and how new technologies, better architectures and new ways of thinking could put your business on a path to a more effective enterprise security strategy.
Finding & Fixing Security Issues In Your Electronic Supply Chain Date: Nov 10, 2016 View webinar As organizations such as Target have discovered, cyber attackers sometimes attack indirectly, through suppliers, contractors, and customers. But how can you ensure that third parties are keeping their own systems secure - and are not providing an avenue to compromise your data? How should you work with your partners in the event of a security incident? In this session, we discuss methods you can use to vet your suppliers' security - and how to work with your partners if a compromise is found.
[DevOps & Serverless Apps] Best Practices for Using & Managing AWS Lambda Services Date: Nov 10, 2016 View webinar The world of the serverless app is here - with AWS Lambda pioneering serverless computing. With its NoOps promise of enabling users to run code that responds to events without requiring provision and management of servers (and only charging for the compute time consumed), Developers and DevOps teams everywhere want to leverage Lambda. But as with any new technology, there are significant challenges with knowledge, adoption and operational usage.
Spearphishing & Other Targeted Social Engineering Attacks On Your Users Date: Nov 10, 2016 View webinar In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods they use to find out about those individuals, and the exploits they execute to fool specific users into giving up sensitive information. You'll also get recommendations on how to prevent this early reconnaissance, as well as the attacks themselves, and how to train your users to recognize an attack before it creates a compromise.
[Malware] New Threats and Trends You Should Know About Date: Nov 09, 2016 View webinar The malware hitting today's enterprises is very different from the malware they were fighting a year ago. New methods of disguise, new types of behavior, and new methods of automated malware generation mean that every day, most organizations are facing malware that is more effective, in forms that they have never seen before and in volumes that are overwhelming to current defenses. How can enterprises detect and eradicate these new threats? Attend this fascinating webinar to hear top malware experts discuss the latest exploits and ways you can build up your anti-malware defenses to help mitigate the effects of new attacks.
Wi-Fi & Bluetooth Low Energy (BLE) are Changing the Wireless World Date: Nov 03, 2016 View webinar In today's era of smart devices, wireless has become a basic need and strategic medium for delivering personalized experiences to mobile users. Wi-Fi is currently the predominate technology for mobile connectivity, but Bluetooth Low Energy (BLE) is quickly growing in popularity as the pre-eminent, "must-have" technology for indoor location based services. When combined together, Wi-Fi and BLE deliver amazing new mobile experiences to users and create a classic example of 1 + 1 = 3.
Outsmart Ransomware Attacks with the Right Protection Strategy Date: Nov 03, 2016 View webinar No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To minimize the fallout of an eventual attack, Security and IT teams need to think and respond differently, and Boards and the C-Suite must understand the real risk of these threats. By doing so you can choose the right protection strategy to help your organization outsmart ransomware attacks.
How Bad Breaches Happen to Good Companies Date: Oct 27, 2016 View webinar In this comprehensive webcast, top security experts will join with Dark Reading editors to discuss how breaches begin - and what you can do to stop them. You'll get a look at new Dark Reading research that reveals the latest trends in data breaches and how companies respond to them. You'll get insight on how attackers choose their targets, and how they research and test those targets before they launch an exploit. And you'll get recommendations on how your organization can interrupt the attack chain - and potentially stop a breach from occurring in the first place.
How to Manage Your Data: Get Your Reporting & Analytics Under Control Date: Oct 26, 2016 View webinar Do you struggle with standard reporting and the timeliness of those reports? Do you need to see beyond standard reporting and leverage data analytics? Are you using transactional and analytical applications built on separate platforms? There is a better way! You can deliver self-service reporting and analytics to business users in one simple, integrated appliance. Attend and you will learn how to reduce BI costs by standardizing and consolidating reporting, how to deliver advanced analytics without the need for a data expert, and how to get back your time so you can manage your business, not your data.
How to Survive a Data Breach Date: Oct 25, 2016 View webinar Data breaches happen more frequently than we think - and the aftermath can be disastrous with many companies suffering losses and reputational damage. What you do after a breach is critical. Above all, don't panic. Take a deep breath and join us for this comprehensive webinar where we'll discuss exactly what your team needs to do in the event of a breach.
Live Demo: Office 365 Provisioning Deep Dive Date: Oct 25, 2016 View webinar Since the release of Office 365 five years ago, many of the "easy" Office 365 migrations have been completed. Customers migrating to Office 365 now have much more complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face - but management can be achieved.
Bank Systems & TechnologyBS&T's 2014 Elite 8 executives are leading their banks to success, whether it involves leveraging the cloud, modernizing core systems, or transforming into digital enterprises.