IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference
SC Media eSummit

Threat Intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently. Join SC Media for a two-day eSummit from May 18-19 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation.

Register for Threat Intelligence: Building a program that turns data into action

Sponsored by: Anomali, AttackIQ, Bandura, Cyberint, DarkTrace, Intel471, IntSights, NetAbstraction, Netenrich, Recorded Future, SafeBreach, Sophos

Threat Intelligence: Building a program that turns data into action

Earn up to 6.5 CPE credits by attending this virtual conference.

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently.

Join SC Media for a two-day eSummit from May 18-19 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation. Experienced threat intel professionals will dive deep on topics that include:

  • How threat intelligence programs can shift a security team from a reactive to a predictive stance
  • Why efficiency immediately increases for security teams once programs are implemented
  • How organizations find strength in numbers through collaborative threat programs

Positioning your organization to foresee potential threats can have a profound impact on risk reduction. Join us to discover how to turn threat data into action. Register now.

AGENDA
Day 1

11:00 AM ET
Keynote: Rising above the noise: How a year of hard lessons redefines demands
Dave DeWalt, Managing Director, NightDragon

A string of cybersecurity incidents during the last year shined a bright spotlight on gaps in the existing tools and tactics used to protect public and private networks. Were these failures in technology or in strategy? For all the advancements made, has the community grown complacent? We will speak to Dave Dewalt, head of acquisition company NightDragon and former CEO of FireEye and McAfee, about why the cybercommunity was caught off guard, what has changed about the threat landscape during his years in the business, why certain startups attract his attention and dollars, and whether a market transformation is in order.

12:00 PM ET
Webcast: Threat intelligence: The essential ingredient in your XDR strategy 
Thomas Graves, Senior Solutions Engineer, Anomali

XDR is a promising security architecture providing a foundation for organizations to move closer to managing their security infrastructure as an integrated, unified platform and preventing, detecting, and responding to threats more effectively across the enterprise. But to be successful, an essential ingredient in any XDR implementation is high-fidelity threat intelligence that connects to structured workflows in order to avoid contributing to even more alert fatigue and a team response that is un-prioritized and unfocused. Come learn about how relevant threat intelligence powers the analytics, detection, investigation, and response layers of XDR.

2:40 PM ET
Webcast: One phish, two phish: Detecting ransomware attacks pre-encryption 
Lindsay Kaye, Director of Operational Outcomes, Insikt Group, Recorded Future

Join this session to hear about:

  • Best practices and methodologies that organizations can use to detect threats 
  • Specific examples of actual compromises by ransomware operators 
  • Guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase

1:20 PM ET
Webcast: Intelligence is good. Requirements-driven intelligence is better 
Maurits Lucas, Director of Intelligence Solutions, Intel 471

Many security practitioners will have heard of “Requirements driven intelligence” – the approach of establishing Intelligence Requirements as the blueprint of your CTI program. But how do you operationalize such an approach? 

In this presentation we introduce a publicly available methodology we developed at Intel 471 called “CU-GIRs” that allows you to establish Intelligence Requirements by looking at stakeholders and use cases, group and prioritize those intelligence requirements, and build collection plans corresponding to the requirements. 

In this way, the CTI program can create more measurable value for its stakeholders and can be continually tweaked to increase its effectiveness and efficiency and respond to changing stakeholder demands. 

Key Topics: 

  • What are Intelligence Requirements (IRs)? 
  • Benefits of Developing Intelligence Requirements (IRs) 
  • Challenges in Building Requirements-Driven Intelligence Programs 
  • Using the CU-GIR methodology to bring structure to the CTI process 

2:00 PM ET
Webcast: Putting your threat intel to work for you
Jane Goh, Cortex Team Lead, Palo Alto 

Are you getting the most out of your threat feeds?  I am guessing not. With the dozens of threat feeds your team gets, it is difficult to understand the relevance of a threat to your environment. And let’s face it, it’s no fun having to manually tune and score indicators of compromise (IOCs) to match your environment.  

So you might be relying on a threat intelligence platform (TIP) to aggregate intelligence sources, but without the real world context linking these threats to incidents within your organization, it’s still hard to take confident action. 

Enter stage left, automation. Join us for this session to learn practical use cases for how automation can help you eliminate manual tasks, reveal critical threats and take automated action so you can seamlessly manage millions of daily indicators across multiple threat feeds.

2:40 PM ET
Webcast: Continuous security validation: Exercise your environment more than the adversary 
Jose Barajas, Technical Director, NA Sales Engineering, AttackIQ 

With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise.

3:20 PM ET
Webcast: Obfuscation in threat hunting: Why should the threat actors know who the good guys are? 
Gordon Lawson, Chief Executive Officer, NetAbstraction

In this session, learn how NetAbstraction effectively hides your enterprise’s network by transparently distributing search and sandbox functions to prevent any correlation back to your company. There is a 90% chance of someone knowing the exact routing of any particular data transmission. NetAbstraction is built on the principles of the US Intelligence Community where non-attribution is essential to conducting effective cyber operations. 

Whether it is OSINT research, Incident Response, or Threat Intelligence, both search and sandbox capabilities should be secure, private, and geographically opaque so as not to provide threat actors with a means of understanding what threats your organization has been exposed to.  Any enterprise directly using the Internet exposes their IP address, location and network identity. Any external connection used by your company is a potential source of attack on your data and systems. NetAbstraction is unique in that we provide a proactive foundation for smart enterprise privacy. 

4:00 PM ET
Webcast: How pin-pointed threat intelligence will help you proactively prevent your next security breach 
Speaker(s): Yochai Corem, Chief Executive Officer, Cyberint

If anyone has benefitted from the pandemic, it has been cyber attackers.  As businesses expanded their investment in cloud resources and other IT resources in response to the pandemic, cyberattacks also dramatically increased.  Businesses reported 445 million cyberattack incidents in 2020, double the rate for 2019. It didn’t have to be this way. With stronger threat intelligence solutions in place, many of the security incidents of 2020 could likely have been averted. During this Yochai Corem, CEO at Cyberint, will demonstrate with examples why pin-pointed Threat Intelligence will help you proactively prevent your next security breach. 

Day 2

11:00 AM ET
Keynote: Case Study: Creating a new threat-sharing community 
Douglas Levin, K12 Security Information Exchange (K12 SIX) and President of EdTech Strategies and the K-12 Cybersecurity Resource Center 

Organizations that operate in the same business sector have much in common, including the cyber threats they typically face, and the challenges of defending against them. And so it is imperative that these organizations have a platform through which they can openly share threat intelligence with each other. This was the thinking behind K12 SIX, a recently formed information sharing & Analysis Center that was specifically created for school districts. In this keynote presentation, Douglas Levin, national director of K12 SIX and president of EdTech Strategies and the K-12 Cybersecurity Resource Center, will detail the challenges and value proposition of creating a threat-sharing community within your industry and initiatives that your own threat-sharing group should consider launching. 

12:00 PM ET
Webcast: Autonomous cyber AI: Redefining enterprise security 
Justin Fier, Director of Cyber Intelligence & Analytics, Darktrace 

In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing. Organizations need to urgently rethink their strategy – to ensure their people and critical data are protected, wherever they are. Powered by autonomous cyber AI, today’s self-learning defenses are capable of identifying and neutralizing security incidents in seconds – not hours. In this session, learn how self-learning AI:  

  • Detects, investigates and responds to threats – even while you are OOTO  
  • Protects your entire workforce and digital environment – wherever they are, whatever the data 
  • Defends against zero-days and other advanced attacks – without disrupting the organization 

12:40 PM ET
Webcast: Actionable threat intelligence 
Greg Iddon, Threat Response Strategist, Sophos  

Signal prioritization, lifting important signals out from the noise, is essential for mature security operations centers. But access to high quality intelligence that helps you derive verdicts and enables you to take action is rare. OSINT feeds are often stale or out of date, URLs for once valid C2s now produce false positives. And even with quality intelligence feeds, how can we turn that intelligence into action?  In this session you will learn: 

  • Practical threat intelligence use cases you can implement on your own 
  • How our threat hunters utilize Sophos threat intelligence services to improve investigations 
  • Suggestions on how to add threat intelligence into your security operations process 
  • Threat intelligence features to look for when choosing an intelligence service partner


1:20 PM ET
Webcast: Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich

Security operations needs context awareness to ensure the success of business initiatives in a world of advanced, targeted attacks. Netenrich empowers security, IT and cloud operations to thrive during adversity with adaptive incident resolution using real time, data driven risk and trust-based decision making. The Netenrich Resolution Intelligence platform streamlines the process of managing, analyzing, and fixing the root cause of incidents to prevent future disruption.

2:00 PM ET
Webcast: How to put your threat intelligence data to work 
Valeriy Leykin, Director, Product Management, SafeBreach 

Having access to threat intelligence is important, but even more important is having a strategy that puts that threat intelligence data to work for you, and the visibility to prioritize the risks that matter most to the business. Join SafeBreach for a discussion around Threat Intelligence best practices, tips for how to ensure the data is feeding into your daily efforts, and how the ability to combine threat intelligence, vulnerability management, and the right attack scenarios can be a force multiplier for your collaborative efforts across the business. 

2:40 PM ET
Webcast: Build your best threat intelligence program
Paul Prudhomme, Head of Threat Intelligence Advisory, Intsights

Security professionals aren’t getting the most out of their threat intelligence program, because they are not applying the concept of the Intelligence Cycle. They need such a comprehensive system that guides collection, analysis, production, intelligence dissemination, and evaluation to inform decision-makers and other stakeholders. 
Join this webcast and improve your threat intelligence program by learning how to: 

  • leverage Priority Intelligence Requirements to ensure that stakeholders receive information they need;  
  • uphold the highest standards of analysis and production; 
  • ensure consumers receive information they need without oversharing; and 
  • garner feedback from consumers to ensure the program remains useful 

Agenda is subject to change

Virtual Conference
SC Media eSummit

Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Register for Enterprise Data Security: Scaling data protection beyond discovery and classification

Sponsored by: Code42, PKware

Enterprise Data Security: Scaling data protection beyond discovery and classification

Earn up to 3 CPE credits by attending this virtual conference.

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Changing data regulations coupled with increased consumer awareness have made data privacy and protection a constant and continuous project for security organizations. Security professionals today must scrutinize every practice within the business to implement a scalable data protection strategy that expands beyond traditional data discovery and classification.

In this upcoming one-day virtual event, SC Media brings together leading data security experts who will unpack the challenges today’s enterprises face on topics that include:

  • Updates to data privacy regulations that are in progress
  • Tools and strategies to help manage data protection
  • How to remain compliant in cloud environments

Discover new strategic approaches and technologies that will allow you to scale data security within your business. Register now.

Virtual Conference
SC Media eSummit

Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and new requirements for the skills to address these issues.

Register for Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

Sponsored by: Duo Security, FireMon, Forcepoint, Fortinet, Sophos

Multi-cloud Security: Confronting the expanding dilemma of cloud architecture

Earn up to 6.5 CPE credits by attending this virtual conference.

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and new requirements for the skills to address these issues.

Join SC Media on June 8-9 for a two-day virtual conference that brings together industry leaders who will share their insights and experiences on the fast-changing world of cloud security. Topics covered will include:

•Determining whether native or third-party security solutions are the right approach for your environment
• Key compliance challenges you can expect and how to handle them
• What an effective defense looks like in a hybrid cloud environment

To evaluate the implications of your cloud architecture, register now.

Virtual Conference
SC Media eSummit

Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Register for Integrating Application Security: Reengineering AppSec as a business catalyst

Sponsored by: Human

Integrating Application Security: Reengineering AppSec as a business catalyst

Earn up to 6.5 CPE credits by attending this virtual conference.

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Producing quality code quickly and securely is always the goal. But efforts to integrate security into the software development cycle is more often perceived as a roadblock than a catalyst. Join SC Media for a two-day virtual event from June 22-23 to hear from top experts in a series of discussions and presentations focused on application security. Topics include:

• How to map application security requirements to compliance frameworks
• Embracing and extending DevSecOps principles
• Standardizing application security policies within business lines

Discover how modern application security programs can operate at the speed and scale that’s required to empower, not deter, the business. Register now.

Virtual Conference
SC Media eSummit

Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

Register for Identity and Access Management: Rethinking your organization’s approach to credentials and permissions
Identity and Access Management: Rethinking your organization’s approach to credentials and permissions

Earn up to 6.5 CPE credits by attending this virtual conference.

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping threats at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

From strong authentication protocols to behavior monitoring capabilities, next-generation identity and access management solutions are showing the way forward. An effective IAM approach will enable security organizations to separate signal from noise — managing and resolving a broad range of exceptions and system-admin failures. It also must fit your organization’s culture and operating model. On June 29-30, SC Media will convene an all-star team of identity security experts to discuss the role of identity and access management in rethinking your organization’s approach to insider threats. Topics will include:

  • The fundamentals of Identity and Access Management
  • Tools and software that help combat insider threats
  • Why insider threats aren’t just tied to malicious employees

Register today for a fresh look at your organization’s approach to IAM, and its exposure to insider risk.

Virtual Conference
SC Media eSummit

Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Register for Data Privacy: Addressing today’s compliance demands
Data Privacy: Addressing today’s compliance demands

Earn up to 6.5 CPE credits by attending this virtual conference.

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Join SC Media for a two-day virtual event from July 13-14 as a collection of security experts share advice on level-setting your data-privacy and security posture, and overcoming compliance challenges. Topics include:

• How to put privacy legislation in the service of your organization
• Understanding key requirements of recent data privacy regulations
• What are the common threat models that lead to data exposure

Aligning your security model with a strong data privacy policy is necessary to prevent breaches that put customers and employees at risk — and expose your organization to legal action. Register now.

Virtual Conference
SC Media eSummit

Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

Register for Vulnerability Management: Moving your organization from a tactical to a strategic posture
Vulnerability Management: Moving your organization from a tactical to a strategic posture

Earn up to 6.5 CPE credits by attending this virtual conference.

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

SC Media will host a two-day virtual event on this important topic from July 20-21. Join our faculty of vulnerability management experts as they share their experience and explore the essentials, including:

• Designing a vulnerability management process from the ground up
• Identifying the tools, resources and processes that work best for your organization
• Setting risk-acceptance criteria

Establishing a vulnerability management program is a key step in your organization’s progress toward its ideal state of cybersecurity. Register now.

Virtual Conference
SC Media eSummit

Advanced Incident Detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources. Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Register for Advanced Incident Detection: Protecting your business from state-sponsored actors
Advanced Incident Detection: Protecting your business from state-sponsored actors

Earn up to 6.5 CPE credits by attending this virtual conference.

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 10-11 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

Virtual Conference
SC Media eSummit

Maintaining Endpoint Security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

Register for Maintaining Endpoint Security: New opportunities and new risks
Maintaining Endpoint Security: New opportunities and new risks

Earn up to 6.5 CPE credits by attending this virtual conference.

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s upcoming virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following a year of disruption. This two-day event, August 24-25, convenes cybersecurity innovators and practitioners who will share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Register today.

Virtual Conference
SC Media eSummit

Secure Cloud Migration

Secure Cloud Migration
Virtual Conference
SC Media eSummit

Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

Register for Data Breach Response: Preparing for the inevitable security incident
Data Breach Response: Preparing for the inevitable security incident

Earn up to 6.5 CPE credits by attending this virtual conference.

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

A quick and efficient response leads to a reduction of losses and quickly restored processes and services for an organization. Join SC Media for a two-day virtual conference from September 21-22 as experts on the topic share what optimal management of a cyber incident should look like. Topics include:

• Knowing when to call in a third-party vs. your own staff
• The role that cybersecurity insurance plays in incident response
• Developing a security culture that impacts your containment strategy

Incident response is all about the maturity and culture that’s developed by the security organization. Discover how to implement one that works for you. Register now.

Virtual Conference
SC Media eSummit

Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Earn up to 6.5 CPE credits by attending this virtual conference. Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list.  While there’s no silver bullet on…

Register for Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat
Detecting Ransomware: Countermeasures to overcome cybercrime’s biggest threat

Earn up to 6.5 CPE credits by attending this virtual conference.

Ransomware revenue for cybercriminals is in the billions of dollars and counting. Equipped with advanced evasion techniques that elude traditional antivirus solutions, this threat is at the top of every cybersecurity professional’s list. 

While there’s no silver bullet on the ransomware detection front, security professionals can employ a multi-pronged approach that includes detection measures focused on networks, endpoints and end users. Join CyberRisk Alliance from September 28-29 for a virtual event that will feature experts ready to share strategies that you can implement right now to detect ransomware in your environment. Topics include: 

  • The role that predictive algorithms play in detecting ransomware
  • How sacrificial network shares can serve as an early warning system
  • The latest exploit kit detection rules that will help detection efforts

Prevent your organization from being locked out. Bolster your knowledge on detection efforts by registering now.

Virtual Conference
SC Media eSummit

Malware Analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Register for Malware Analysis: Taking incident-management to the next level

Sponsored by: AttackIQ

Malware Analysis: Taking incident-management to the next level

Earn up to 6.5 CPE credits by attending this virtual conference.

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Please join SC Media for a two-day virtual conference — October 5-6 — that will bring you up to speed on a capability of increasing relevance to companies across a broad range of sizes and sectors. Key discussion and presentation topics will include:

  • Proven tools and methodologies that detect and mitigate malware attacks
  • Establishing a malware analysis capability that suits your organization
  • A look over the horizon at tomorrow’s malware threats

To determine if malware analysis has place in your security plan, register now.

Virtual Conference
SC Media eSummit

Zero Trust

Zero Trust
Virtual Conference
SC Media eSummit

Cybersecurity Training and Awareness

Earn up to 6.5 CPE credits by attending this virtual conference. The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today? SC Media will host a two-day event focused on this topic on Nov.

Cybersecurity Training and Awareness

Earn up to 6.5 CPE credits by attending this virtual conference.

The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today?

SC Media will host a two-day event focused on this topic on Nov. 16-17 to help cybersecurity professionals design and implement the awareness and training program that’s right for their organization — its culture, counterparties, and employee community.

This interactive learning program will feature experts on security awareness program development and technologies who will discuss the discipline’s state of the art and lead a deep dive on topics including:

  • Knowing the strengths and weaknesses of your workforce and turning them to your advantage
  • Building security into the fabric of your culture
  • Understanding the threat of business email compromise and why it persists

To gain knowledge and perspective that will help you build cybersecurity buy-in from your company’s entry level to its C-suite, register now.

Virtual Conference
SC Media eSummit

Cloud Security

Cloud Security
Virtual Conference
SC Media eSummit

Threat Intelligence

Threat Intelligence
Virtual Conference
SC Media eSummit

Cybersecurity for Financial Services

Cybersecurity for Financial Services