ITProToday: How to Be Ready for Ransomware (Aug. 18th)
IT - CxO Security Events

DARKReading: Implementing Zero Trust in Your Enterprise (June 21)
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT
In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization.

Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy.

Attend this webinar and you'll:

  • Formulate a practical checklist of how (and where) to start with implementing zero trust in your organization.
  • Anticipate potential pitfalls with zero-trust deployment and and be able to nimbly sidestep them.
  • Be better equipped to reduce your overall risk and make a big dent in your volume of false-positives.
  • Improve the overall threat posture of your organization as well as its data, applications, and end-users.

Hosted by DARKReading

In this webinar, you'll learn what topics IT executives need to study up on now, so they're ready to tackle the big 'to pay or not to pay' question later.

You don't want to pay a ransomware attacker. You can't afford to pay a ransom, but can you afford NOT to pay it? CIOs ask themselves this question every day, and they rarely know the answer. Precious time is wasted while they try to determine the extent of the damage, the value of the data/assets impacted, the quality of backup systems, the opportunity costs of downtime, and more.

Attend this webinar, and you'll:

  • Dissect the experiences of other organizations victimized by ransomware to see how paying ransoms did or did not help.
  • Gain knowledge of new, sinister ransom requests, which ask for assets far more valuable than money.
  • Learn how to better assess all of these risks to protect your business from the impacts of this ransomware attack (and the next).

Hosted by InformationWeek

Join us for this webinar with Crane Hassold, Director of Threat Intelligence at Abnormal Security, where he'll answer your questions about this new threat, including: What are the various types of financial supply chain compromise? How do threat actors use impersonation and account compromise to run invoice fraud, aging report attacks, and RFQ scams?Why have threat actors shifted tactics, and what do your employees need to know? How can you stop these evolving attacks before they reach your inboxes?


The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.

Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them.

Hosted by DARKReading

DARKReading: How Data Breaches Happen (June 23rd)
Thursday, June 23rd, 2022: 11:00 AM to 5:15 PM EDT
A full-day virtual event on the vulnerabilities that lead to security incidents - and how to respond in the event of a data breach.

Every day, the headlines are filled with news of major enterprises being hacked or infected with ransomware. From supply chain attacks such as SolarWinds or Kaseya to critical infrastructure breaches such as Colonial Pipeline, it seems that no organization is safe from cyber breaches. Is your organization ready to respond when it happens to you?

On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.

If you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you.

Hosted by DARKReading

Security Boulevard: AI and ML in Security (June 27th)
Monday, June 27th, 2022: 1:00 PM to 2:00 PM EDT
Join us as we discuss: The current state of AI and ML in security; The future state of AI and ML in security; What organizations can do now to prepare for the next wave of AI in ML in cybersecurity, from both a threat perspective and protecting against those threats

When artificial intelligence (AI) first arrived on the cybersecurity scene, there was understandably a lot of skepticism. Grandiose claims about the ability of AI platforms to eliminate the need for security analysts have given way to more rational assertions that focus on the role machine learning algorithms will play in augmenting the skills-and easing the strain on-cybersecurity professionals. The conversation has evolved as understanding has grown about what AI and machine learning can and cannot do in a cybersecurity context. Now, it isn't so much about whether AI will replace cybersecurity professionals as it is about how quickly AI models based on machine learning algorithms can be applied to help thwart attacks.

Hosted by Security Boulevard

Attend this webinar and you'll: Be better prepared to use threat modeling and risk analysis to customize your own security strategy; Create a richer, more sophisticated threat model that reduces risk and keeps your data and users more safe.

As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization's security.

Hosted by DARKReading

DARKReading:Outsourcing Cybersecurity: A Decision Maker's Guide (June 29th)
Wednesday, June 29th, 2022: 1:00 PM to 2:00 PM EDT
In this webinar, experts offer advice on how an enterprise can outsource a wide variety of cyber tasks, from penetration testing to how to ensure that the third-party provider is giving you the best possible security services.

When it comes to cybersecurity, very few enterprises have all the skills and resources they need on staff. On today's market, your enterprise can outsource a wide variety of cyber tasks, from penetration testing to security monitoring to incident response. When does outsourcing make sense for your organization?

Hosted by DARKReading

On Wednesday, June 29, at 3:00 pm ET (12 noon PT), please join CIO contributing editor Charles Pelton and subject-matter experts from VMware for an interactive, one-hour discussion: SASE: The Quest to Manage and Secure Endpoints, Edge Services, and Cloud Resources.

The modern enterprise is more complex than ever with workers, applications, and core infrastructure distributed from the core to the cloud and then to the edge. That's why many organizations seek a single, unified approach to manage users and devices, edge services, and both public and private clouds. Increasingly companies are deploying SASE cloud services to both manage and orchestrate their networks, security challenges, and edge services. They are looking to SASE to help transform infrastructure management, reduce TCO, and accelerate application modernization.

Hosted by CIO

Data Connectors: Virtual Cybersecurity Summit (June 30th)
Thursday, June 30th, 2022: 9:00 AM to 5:00 PM EDT
Join the NorthEast Virtual Cybersecurity Summit to hear from some of the industry's leading experts from across the country, with a particular focus on the Northeastern region.

In this immersive, virtual environment, you will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.

The live, interactive environment of the NothEast Virtual Cybersecurity Summit will allow you to interact with representatives from some of the world's top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.

Hosted by Data Connectors

CSO: Future of Cybersecurity Summit (July 19-2022)
Tuesday, July 19th, 2022: 1:00 PM to 7:00 PM Wednesday, July 20th
Our best-in-class keynotes, conversations, and workshops give you insight into how leaders in every field approach their toughest problems. You'll leave prepared with game-plans for the biggest market shifts, and ready for the future of work.

How Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response

Anticipation. It's one of the U.S. Army's eight principles of sustainment, along with integration, responsiveness, simplicity, economy, survivability, continuity, and improvisation. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don't? Dwell time grows - and with it - exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.

Hosted by CSO

Attend this complimentary virtual event on July 19th and you'll: ; Learn about the latest technologies that are revolutionizing identity governance and access management ; Get practical tips for overcoming obstacles to innovation ; Explore the state of Making Multi-factor Authentication (MFA) and how to speed up adoption and Understand the basics on machine identities and where they fit in your IAM strategy

Despite all the password leaks, credential stuffing attacks, data breaches, wasted time, and abandoned shopping carts, most businesses still rely on antiquated identity and access management systems. There are newer alternatives that provide both better security and an easier user experience. But overhauling an enterprise IAM system is full of obstacles.

Hosted by InteropDIGITAL

Attend this webinar and you'll: Join a nuanced discussion about when to move to the edge versus the cloud. ; Learn tips for how to manage specific security challenges of edge computing. ; Explore how to securely build out the edge from the start and prepare the environment to manage expanding workloads and new applications. and Find out how to manage and secure an exploding number of devices on the edge.

Advances in networking and new technologies have expanded the possibilities of deploying applications at the network edge. These edge devices bring with them their own security management challenges and risks. How do you scale your security to manage the sheer number of devices on the edge? In this webinar, experts discuss how to decide whether to move to the cloud or deploy to the edge. You will learn strategies and technologies for building out the edge securely and to manage the new workloads and applications effectively.

Hosted by DARKReading

See all Archived IT - CxO Security Events articles See all articles from this issue