How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?
Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.
In his...
The challenges facing enterprises now are creating secure zones in data centers and cloud deployments, which allow companies to separate workloads and secure them individually while providing secure user access to the remote workforce.
Another task on hand for organizations is to advance the pace of innovation and...
Enterprises are accelerating the digital transformation journey as the pandemic has started impacting the typical and traditional human behavior and business environments. The digital transformation has necessitated the enterprises to increase focus on securing their valuable digital assets and manage business...
As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security...
Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it's important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that...
In this session, Cordery law firm partner Jonathan Armstrong will review some of the legal and compliance issues for European enterprises in the post-pandemic era, including:
GDPR enforcement
The unique risks associated with returning to the office
Increased security and litigation risks related to device and...
The attack surface will be larger than ever, the workforce more distributed than we've known, and our cybersecurity will be contingent upon how we approach identity, cloud, email and endpoint devices.
This is the unfolding scenario for 2021, and this panel brings together a diverse group of experts to discuss:
The...
All Industries need to continuously ensure the security of their IT environment. Security is a must, but it is painful, expensive, and there is no glory! Blighted with challenges the real question is: what are the critical points that require the biggest effort, and how to make them smoother and possibly automatic....
As Senior Director, Security Strategy, Patrick is responsible for creating and evangelizing key messages about Fortinet’s cyber security solutions. Through his in-depth understanding of the complexities surrounding the subject, Patrick is able to cut through the half-truths and myths to provide clear and concise...
An attacker's most efficient approach to a pay day is to land on a host and then 'live off the land' using the residue of errant credentials and connections left behind from the course of daily operations-cached domain admin credentials, disconnected RDP sessions, local admin accounts using the same password, and...
Big data once meant terabytes; today, your business thinks in petabytes or more. Learn how to combat critical threats in the Financial Services industry and in your own network by correlating your massive amounts of telemetry data with threats in the wild at the speed of a Google search. Power your incident...
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies...
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global...
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.