CIO: Becoming First-Party Data Driven - Empowering CX without Overpowering Relationships (Dec. 15th)
IT - CxO Security Events

Cybersecurity: What You Don't Know Can Hurt You (Nov. 22nd)
Tuesday, November 22nd, 2022: 1:00 PM to 2:00 PM ET
Do your attackers have a better view of your risks in your environment than you? With the aggressive move to the cloud comes an expanding and complex attack surface that adversaries are waiting to exploit. As a result, organizations are more frequently assessing security posture management processes, examining vendor risk management requirements, and testing security to keep up with accelerated digital transformation initiatives.

Despite these efforts, 30-40% of an organization's attack surface is unknown to an organization and hence, unsecured. Both Forrester and ESG note that comprehensive asset data is essential for vulnerability risk management, and a quality ASM solution should provide the necessary data to prioritize risks for effective remediation. With Xpanse, your organizations can finally have a better picture of your risks than your attackers. Security begins with knowing your risks and that is only possible with a complete view of your attack surface. Join us in this session to understand how your attack surface is changing and how you can protect yourself against evolving attackers.

In this briefing, you will learn about:

  • Protecting your organization against risks emerging from cloud complexity and unknown assets.
  • How asset management depends on frequency and cooperation.
  • How automation isn't just a benefit, it's a necessity.

Hosted by DARKReading


Security Boulevard: Securing Open Source (Nov. 28th)
Monday, November 28th, 2022: 1:00 PM to 2:00 PM ET
In this editorial webinar, we'll examine the current state of application security, the challenges associated with ensuring code is free of vulnerabilities and explore some of the best practices organizations can take to shift security further left in the software development life cycle.

There is increasing focus on the security of open source software in the wake of a series of high-profile breaches involving software supply chains. As most, if not all, applications developed today use some form of open source code, the concern is that a bad actor will contribute code loaded with malware to a widely-used project. Fortunately, the open source community and a broad coalition of vendors are now rallying to create the tools and processes needed to secure open source software.

Hosted by Security Boulevard


InteropDIGITAL: Cyber Resilience in Uncertain Times (Dec. 1st)
Thursday, December 1st, 2022: 11:00 AM to 12:00 PM
Are you trying to ensure your organization has the cyber resilience it needs? We're here to help!

Cautious organizations prepare for disasters with measures like cyber insurance and good backups. Yet, cyberattacks, climate change, a pandemic, and civic unrest are threatening business continuity, disaster recovery, and cyber resilience plans. Ransomware has become so costly that insurers are raising premiums or leaving the cyber market entirely. Backup data centers are at risk of damage from wildfires, floods, and heat waves.

Attend this FREE virtual event on December 1st and you'll learn:

  • How to assess the cyber risks of today
  • What role insurance should play in your resilience plan
  • How to craft an effective incident response plan
  • What new factors you should consider before investing in IT infrastructure
  • About the latest research and best practices for protecting your backups against ransomware
  • The latest thinking in incident response plans and what your 2023 plan should look like

Hosted by InteropDIGITAL


Security Boulevard: Application Security (Dec. 5th)
Monday, December 5th, 2022: 1:00 PM to 2:00 PM EST
Recent high-profile software supply chain breaches have sharpened the focus on application security. However, as cybersecurity professionals know all too well, concern doesn't always equate to action. In theory, the rise of DevSecOps best practices that shift responsibility for application security further left should reduce, or outright eliminate, the vulnerabilities that now routinely make it into production applications

Virtual

Unfortunately, it's still early days as far as DevSecOps is concerned, so the impact this shift might have is, at best, limited, especially when you consider the level of security knowledge the average developer possesses. Cybersecurity professionals know in their bones that developers are the root cause of most of the issues they face daily. It's not that developers deliberately build and deploy vulnerable applications; rather, they simply don't know what to look for. By the time the application is scanned-usually a few days before it's supposed to be deployed-it's too late to do much more than make note of the security flaws that need to be addressed. Breaking that cycle will require cybersecurity teams to meaningfully engage developers much earlier in the application development life cycle.

Hosted by Security Boulevard


VentureBeat: Intelligent Security Week Agenda (Dec. 6th - 8th)
Tuesday, December 6th, 2022: 9:00 AM to 10:30 AM Thursday, December 8th
The inaugural Intelligent Security Week is the hybrid event to be organized by VentureBeat, that is dedicated to the intersection between cybersecurity and AI.

Alongside valuable virtual content, this event also includes the opportunity for key decisions makers to attend high-touch in-person event experiences across the US.

Day 1: The critical role of AI & ML in cybersecurity

  • 9.00am Optimizing security strategies during an acute talent shortage
  • 9.30am Why AI is critical for cutting edge, effective cybersecurity
  • 10.00am Machine Learning to automate cybersecurity evaluation and response

Day 2: December 7 - Threat identification and mitigation

  • 9.00am Identifying and mitigating the most critical security risks:
  • 9.30am Internal threats that create external attack opportunities and how to combat them

Day 3: Industry-specific case studies

  • 9.00am Investing in technologies and people to defend financial institutions
  • 9.30am Best practices and technologies that are the ultimate antidote against healthcare cyberattacks

Who will attend this event

C-levels, SVP, VP, Directors and business decision makers from the following functions: CEO

Hosted by VentureBeat


CIO/CSO: Understanding Cyber Attackers And Their Methods (Dec. 7th)
Wednesday, December 7th, 2022: 11:30 AM to 5:05 PM EST
CIO's and CSO's Innovation Agenda, a one-day summit where those who walk the talk come to share their secrets just in time for the new year. We'll feature leaders whose perseverance has paid off in tangible results, among them winners of the 2022 CIO 100 and CSO50 awards programs. You'll learn from their hard-won efforts how to build winning teams, an innovative culture, and models for continuous innovation that keep your stars engaged.

Innovation is the future.

New products, features, and experiences to attract - and retain - customers and employees alike is the only path to growth and business success. Yet while some companies clearly get it right, innovation is not easy. It takes focus, rigor, and a culture that supports the diversity of thought and risk-taking.

Hosted by CIO and CSO


In this session, you will learn about: Trends influencing the modern attack surface; How you can build an up to date version of your attack surface to include both known and unknown assets...

The best way to manage exposure, reduce risk, and improve your security posture is to understand your attack surface through the eyes of an attacker. Cortex Xpanse provides automated Attack Surface Management with an agentless implementation. Xpanse scans the entirety of IPv4 space twice per day to uncover all assets connected to your organization, even if they were unknown to you or owned by a third-party. The Unit 42 Attack Surface Assessment service boosts your Attack Surface Management (ASM) program with visibility into your on-prem and cloud-based internet-connected assets and recommendations on prioritized actions so you can better defend your organization.

Hosted by DARKReading


In this webinar you'll learn: Government recommendations for effective MFA. MFA features that make it easily hackable.

The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. The same as a simple password, they can bypass MFA with a regular-looking phishing email.

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He'll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4's Chief Hacking Officer.

Hosted by InformationWeek


In this webinar, two security experts will share their perspectives on how security leaders and their teams should think about resourcing in 2023. From managing business risk to defending against evolving threats to staffing and resource allocation, this discussion will provide a broad look at trends likely to be at the forefront of security in the coming year.

2023 has the potential to be a year like no other. As geopolitical, economic and security challenges come to a head, organizations and their security leaders face tough decisions: Stay the course with security resources already in place? Cut budget to help weather the economic storm? Or use this period as a time to harden defenses and prepare for growth? There is no easy conclusion - and no single right answer.

Hosted by Security Boulevard


Cybersecurity Outlook 2023 (Dec. 13th)
Tuesday, December 13th, 2022: 11:00 AM to 5:00 PM ET
This virtual event will focus on some of the new threats posed by cybercriminals and nation-states.

On December 13, Cybersecurity Outlook 2023 will look at some of the new threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You'll hear from some of the cybersecurity industry's leading experts, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.

This free, all-day virtual event hosted by Black Hat, Dark Reading and Omdia will offer expert insight on the cyber-threats and technology trends enterprises will face in the coming year.

Hosted by blackhat, DARKReading, OMDIA


During this webinar you will: Get insider tips on negotiating cloud service provider agreements and managing ongoing communication in the event of a compromise; Find out how to get the best visibility into the security of the entire cloud environment.

With so many workloads in the could these days, enterprises are working with one or more of the major cloud services providers. How you can be ensured that these providers are handling data securely? What is the plan if there is a breach, and how can you ensure they have the proper risk mitigation protocols in place? In this webinar, experts offer insight on how to best work with cloud services providers. You'll learn how which security telemetry is critical to collect and how communication and collaboration should work if there is a breach or other type of security incident. Walk away with practical advice on the tools and best practices to put in place to ensure visibility into the security of cloud data.

Hosted by DARKReading

See all Archived IT - CxO Security Events articles See all articles from this issue