TechTalk Summits: Making Your Business Case For A Digital Transformation (Dec. 9th)
IT - CxO Security Events

Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they're more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.

Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they're more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist where he'll share a comprehensive strategy for phishing mitigation. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you're prepared to defend against ever-present IT security threats like phishing.

In this webinar you'll learn:

  • How to develop a comprehensive defense-in-depth plan for phishing mitigation
  • Ideas for security policies you can implement now
  • Technical controls all organizations should consider
  • Gotchas to watch out for with cybersecurity insurance
  • Why it's critical to develop your organization's human firewall

Hosted by TechTalk Summits




Virtual

Cybercriminals love leaked credentials. In fact, leaked credentials are involved in 61% of breaches. But leaked credentials can be difficult to discover due to the fact that cybercriminals trade them on the dark web and other underground channels, well outside the traditional visibility of many organizations. And taking action on discovered credentials is easier said than done thanks to large and messy data sets and varying internal requirements.

Identifying and managing leaked credentials doesn't need to be difficult. In a live webinar on Wednesday, December 1 at 11 AM ET, Recorded Future experts John Wetzel and Trevor Lyness will take a deep dive on the leaked credentials market.

Hosted by Recorded Future


Learn more about how criminals are increasingly targeting open-source, third-party components; Get tips and best practices for a modern patch management process; Get advice on how to scan, detect and remediate bugs in real time; Walk away with ideas for a new approach to patch management that you can put in place immediately

A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis.

Hosted by DARKReading, kaspersky


Hear IDC Analyst and Program Director, Jay Bretzmann, and Product Marketing Manager for OneLogin, Ariel Zommer, discuss identity and access management predictions for 2022.

The hallmarks of 2021 included launching hybrid work policies and dramatic ransomware attacks. 2022 is where the rubber will meet the road as work scales to meet employees wherever they are, ransomware attacks persist, and corporate initiatives of digital transformation accelerate to meet rising business needs. Join IDC Analyst and OneLogin Sr. Product Marketing Manager, Ariel Zommer, for a look ahead to what 2022 has in store for Identity and Access Management (IAM).

Hosted by TechTalk Summits


Learn how to spot the signs of a malcious insider; Find out how to identify anomolous behavior early - before damage is done; Gain insights on how to structure your envionrment to keep it guarded from malicious insiders; Get ideas for safeguards you can put in place today to protect against malicious insiders

It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data.

Hosted by DARKReading, DTEX


FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Virtual | Live

FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

'Cybersecurity is no longer just an IT problem'

Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world's security leaders and gain other pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world's security leaders.

Hosted by FutureCon

See all Archived IT - CxO Security Events articles See all articles from this issue