IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference

Improve vulnerability and patch management strategies

Threat actors are known to take the path of least resistance when it comes to compromising organizations. This is why cybercriminals often focus on unpatched software vulnerabilities. For years, this has been a major issue for many organizations, and it continues to be the case. It’s no longer acceptable for vulnerability management to be given a comfortable routine approach.

Register for Improve vulnerability and patch management strategies

Sponsored by: Checkpoint

Improve vulnerability and patch management strategies

Threat actors are known to take the path of least resistance when it comes to compromising organizations. This is why cybercriminals often focus on unpatched software vulnerabilities. For years, this has been a major issue for many organizations, and it continues to be the case. It’s no longer acceptable for vulnerability management to be given a comfortable routine approach.

In this upcoming CyberRisk Alliance eSummit, centered on vulnerability assessment, some of the most prominent security leaders will be given a platform to share their approaches to tackling patch management issues, including:

  • Improving your visibility into vulnerability risk
  • Taking an intelligence-driven approach to prioritizing flaw mitigation
  • How to feed vulnerability data into other security solutions for enhanced intelligence

The modern-day security leader’s approach to vulnerability management must work in tandem with other security initiatives. To reach this ideal state of security and visibility, bolster your knowledge by registering for this event now.


Virtual Conference

Knowing your adversary: Mapping cyber kill chain indicators to security tactics

Knowing your adversary: Mapping cyber kill chain indicators to security tactics January 26-27 2021 10:30 am – 4:00 pm EDT Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.

Register for Knowing your adversary: Mapping cyber kill chain indicators to security tactics
Knowing your adversary: Mapping cyber kill chain indicators to security tactics

Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Mapping the kill chain — understanding each stage of an attack from early reconnaissance to data removal — is increasingly an essential starting point. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by government-backed forces to target smaller companies — especially as more small organizations increase the reach of their digital operations. In other contexts, bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.

Join CyberRisk Alliance for a two-day virtual conference, Jan. 26-27, in which we’ll bring together some of the most innovative thinkers in threat detection and incident response, endpoint security, and more, as they unpack the practical implications of adversary intelligence, including:

  • The cyberattack methods hackers are using today.
  • The cybersecurity data that should influence your 2021 planning.
  • Defense strategies and techniques to overcome ransomware.

Designed for organizations of all sizes, this virtual conference provides comprehensive perspective on why and how to enhance your defenses by adopting a more proactive stance. Register now.


Virtual Conference

Streamlining Network Security: Building integrity and confidentiality – and maintaining accessibility – in enterprise environments

Streamlining Network Security: Building integrity and confidentiality – and maintaining accessibility – in enterprise environments February 9 & 10, 2021 10:30 am – 4:00 pm EDT Digitalization offers many advantages for organizations, but it also significantly raises the bar on ensuring the security of your data and your people. Designed for all organizations with digital operations — from old e-commerce hands to pandemic-displaced newcomers — this program will explain how to tighten up your network without giving up its advantages.

Register for Streamlining Network Security: Building integrity and confidentiality – and maintaining accessibility – in enterprise environments
Streamlining Network Security: Building integrity and confidentiality – and maintaining accessibility – in enterprise environments

February 9 & 10, 2021
10:30 am – 4:00 pm EDT

Digitalization offers many advantages for organizations, but it also significantly raises the bar on ensuring the security of your data and your people. Designed for all organizations with digital operations — from old e-commerce hands to pandemic-displaced newcomers — this program will explain how to tighten up your network without giving up its advantages.

“Streamlining Network Security” — a CyberRisk Alliance virtual conference taking place Feb 9-10 — covers the strategies and tactics that will give your organization the perspective it needs to make the right network security choices. The program will span key approaches ranging from Zero Trust to identity-based access policies. It will include a close look at intelligent network solutions — which enable informed decision-making about threats in real time.

Attendees will learn:

  • Why understanding network traffic at scale is critical
  • The primary benefits of adopting a Zero Trust framework
  • How to reach an ideal state of security to achieve regulatory compliance

Ensure your network and endpoints are secure, resilient and compliant. Register now.

Virtual Conference

Threat Hunting and Detection: Locating and isolating threat actors in your network

Threat Hunting and Detection: Locating and isolating threat actors in your network February 23 & 24, 2021 10:30 am – 4:00 pm EDT Many cybersecurity solutions leave security organizations playing a reactive cat-and-mouse game — one in which cybercriminals always seem to have the edge. Refining your threat hunting and detection capabilities is essential to shifting your strategy to a proactive stance.

Register for Threat Hunting and Detection: Locating and isolating threat actors in your network
Threat Hunting and Detection: Locating and isolating threat actors in your network

February 23 & 24, 2021
10:30 am – 4:00 pm EDT

Many cybersecurity solutions leave security organizations playing a reactive cat-and-mouse game — one in which cybercriminals always seem to have the edge. Refining your threat hunting and detection capabilities is essential to shifting your strategy to a proactive stance.

The tools and techniques you implement to anticipate attacks can mean the difference between thwarting a bad actor or cleaning up after one.

CyberRisk Alliance is hosting a two-day eSummit taking place Feb. 23-24, that will dive deep on proactive threat detection topics including:

  • How to build a threat intelligence capability
  • Monitoring new attack vectors in the cloud
  • How to improve incident detection and speed up response

Learn what today’s threat detection expectations are and what cyber first responders face. Register now.

SPEAKERS

Anthony Fox

Strategic Business Manager

F-Secure

Anthony Fox is responsible for strategic business growth for F-Secure in North America. With over 10 years of experience in enterprise level solutions, Fox specializes in implementing cyber defense programs across finance, and critical national infrastructure.

DAVID MYRON

Associate Director, Content, Digital Events

CyberRisk Alliance

Virtual Conference

Accelerate 2021: Enabling business innovation through security

Accelerate 2021: Enabling business innovation through security February 23-24, 2021 10:30 am – 4:00 pm EDT Achieving your organization’s future vision requires re-envisioning cybersecurity as a growth enabler. What do design, development and planning look like when information security comes to the table early and stays there for the duration? Forward-thinking C-level executives no longer see cybersecurity as a check on their ambitions but instead embrace it as a driver of innovation, competitiveness and growth. CyberRisk Alliance’s Accelerate 2021 – a new flagship virtual conference – will focus on Enabling Business Innovation Through Security.

Register for Accelerate 2021: Enabling business innovation through security
Accelerate 2021: Enabling business innovation through security

Achieving your organization’s future vision requires re-envisioning cybersecurity as a growth enabler. What do design, development and planning look like when information security comes to the table early and stays there for the duration?

Forward-thinking C-level executives no longer see cybersecurity as a check on their ambitions but instead embrace it as a driver of innovation, competitiveness and growth. CyberRisk Alliance’s Accelerate 2021 – a new flagship virtual conference – will focus on Enabling Business Innovation Through Security.

As operations, processes, and business functions are re-engineered into a single digital operating model, information security is introduced early on and staying throughout the process. Accelerate 2021 will bring together a community of experts and thinkers that have created a culture of innovation and trust within their organizations.

Throughout this virtual two-day, multi-track event, security professionals will access informative discussions and guidance to propel them to inspire change within their businesses. From supporting agility and streamlining operations to improving data management, attendees will tap into concepts that allow them to achieve growth through cybersecurity management.

It’s time to position yourself for success to thrive in the digital age. Register now.

Virtual Conference

Ransomware: Critical components of an incident response playbook and more

Ransomware: Critical components of an incident response playbook and more April 13-14, 2021 10:30 am – 4:00 pm EDT Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity.. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises – all have roles to play.

Register for Ransomware: Critical components of an incident response playbook and more
Ransomware: Critical components of an incident response playbook and more

Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity.. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises — all have roles to play.

Join SC Media for a two-day eSummit from April 13-14, to learn from industry leaders as they share insights on adopting an effective response strategy. Topics include:

  • Developing a ransomware incident response playbook
  • An update on new ransomware strains found in the wild
  • The role “human firewalls” can play in your defensive toolkit

As ransomware evolves, so should your approach. Detecting a ransomware attack requires prompt action. Start preparing now and register today.

Virtual Conference

Threat intelligence: Building a program that turns data into action

Threat intelligence: Building a program that turns data into action April 20-21, 2021 10:30 am – 4:00 pm EDT Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently. Join SC Media for a two-day eSummit from April 20-21 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation.

Register for Threat intelligence: Building a program that turns data into action
Threat intelligence: Building a program that turns data into action

Shifting your security focus to the risks that matter most requires intelligence. But even organizations with access to threat intelligence can find themselves challenged when it comes to leveraging that data effectively and consistently.

Join SC Media for a two-day eSummit from April 20-21 focused on building a threat intelligence program that fits your organization’s needs. This strategic learning opportunity is designed to help both organizations that are considering standing up a threat intelligence practice as well as those that may have struggled with implementation. Experienced threat intel professionals will dive deep on topics that include:

  • How threat intelligence programs can shift a security team from a reactive to a predictive stance.
  • Why efficiency immediately increases for security teams once programs are implemented.
  • How organizations find strength in numbers through collaborative threat programs.

Positioning your organization to foresee potential threats can have a profound impact on risk reduction. Join us to discover how to turn threat data into action. Register now.

Virtual Conference

Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses

Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses May 4-5, 2021 10:30 am – 4:00 pm EDT Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Register for Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses
Cybersecurity for your Supply Chain: Overcoming the interconnected threats impacting businesses

Today’s supply chains are as much about the flow of information as they are about goods and services. Managing their associated security risk is a complex and critical task that touches on multiple functions within and outside the enterprise.

Cybersecurity in the supply chain spans the full breadth of your organization’s ecosystem: sourcing, vendor management, business continuity and quality control, physical security and more. To help organizations get their arms around this challenge, SC Media is hosting a two-day virtual conference focused on assessing exposures and charting a path forward. Discussions and presentations will include:

  • Establishing an enterprise risk assessment process.
  • Verifying supplier practices and procedures
  • Integrating threat intelligence approaches

A secure organization is only as strong as its weakest link. Learn about the scalable and repeatable processes that keep your counterparties and suppliers in line with your risk management vision. Register now.

Virtual Conference

Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprise Data Security: Scaling data protection beyond discovery and classification May 25-26, 2021 10:30 am – 4:00 pm EDT Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Register for Enterprise Data Security: Scaling data protection beyond discovery and classification
Enterprise Data Security: Scaling data protection beyond discovery and classification

Enterprises today face tremendous data-security challenges: Datasets are growing and diversifying; privacy regulations are reaching farther and gaining complexity; the attack surface is expanding. It’s not just about data loss. The exposure of customer data has quickly become a central area of concern for security departments, as well as board members.

Changing data regulations coupled with increased consumer awareness have made data privacy and protection a constant and continuous project for security organizations. Security professionals today must scrutinize every practice within the business to implement a scalable data protection strategy that expands beyond traditional data discovery and classification.

In this upcoming two-day virtual event, SC Media brings together leading data security experts who will unpack the challenges today’s enterprises face on topics that include:

  • Updates to data privacy regulations that are in progress
  • Tools and strategies to help manage data protection
  • How to remain compliant in cloud environments

Discover new strategic approaches and technologies that will allow you to scale data security within your business. Register now.

Virtual Conference

DevSecOps for the Cloud: Secure development and deployment in high-velocity environments

DevSecOps for the Cloud: Secure development and deployment in high-velocity environments June 15-16, 2021 10:30 am – 4:00 pm EDT Scale and speed are two words that aren’t typically synonymous with cybersecurity, but that’s all changing. As organizations continue to expand their digital capabilities and reach — harnessing cloud technology’s power along the way — they’re increasingly embracing DevSecOps — an approach in which development, security and operations work together, in a fully integrated process from kick-off to delivery.

Register for DevSecOps for the Cloud: Secure development and deployment in high-velocity environments
DevSecOps for the Cloud: Secure development and deployment in high-velocity environments

Scale and speed are two words that aren’t typically synonymous with cybersecurity, but that’s all changing. As organizations continue to expand their digital capabilities and reach — harnessing cloud technology’s power along the way — they’re increasingly embracing DevSecOps — an approach in which development, security and operations work together, in a fully integrated process from kick-off to delivery.

At the heart of DevSecOps is an assumption that optimal security is built in, rather than applied as a ring fence around applications and data. Reaching an ideal state of fast, efficient, and secure development, requires shifting security left and out of its customary position at the end of a waterfall process.

To bring you up to speed, SC Media is hosting a new virtual conference focused on DevSecOps for the Cloud. Scheduled from June 15-16, it will provide instruction and insights on key topics, including: 

  • How to establish a comprehensive DevSecOps program
  • Integrating your security team within a DevSecOps framework
  • Understanding DevSecOps implications for application security implications, asset management and more

To keep your business on the cutting edge of development — and security — register now.

Virtual Conference

Integrating Application Security: Reengineering AppSec as a business catalyst

Integrating Application Security: Reengineering AppSec as a business catalyst June 22-23, 2021 10:30 am – 4:00 pm EDT Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Register for Integrating Application Security: Reengineering AppSec as a business catalyst
Integrating Application Security: Reengineering AppSec as a business catalyst

Here’s the challenge: Web applications are progressively extending the range of critical business operations they support. But software development for cloud-native environments requires continuous security oversight. Against this backdrop, cybersecurity leaders and strategists must strike a balance between accelerating a business’s go-to-market and safeguarding the applications that fuel its growth and productivity.

Producing quality code quickly and securely is always the goal. But efforts to integrate security into the software development cycle is more often perceived as a roadblock than a catalyst. Join SC Media for a two-day virtual event from June 22-23 to hear from top experts in a series of discussions and presentations focused on application security. Topics include:

• How to map application security requirements to compliance frameworks
• Embracing and extending DevSecOps principles
• Standardizing application security policies within business lines

Discover how modern application security programs can operate at the speed and scale that’s required to empower, not deter, the business. Register now.

Virtual Conference

Identity and Access Management: Rethinking your organization’s approach to insider threats

Identity and Access Management: Rethinking your organization’s approach to insider threats June 29-30, 2021 10:30 am – 4:00 pm EDT Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

Register for Identity and Access Management: Rethinking your organization’s approach to insider threats
Identity and Access Management: Rethinking your organization’s approach to insider threats

Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.

From strong authentication protocols to behavior monitoring capabilities, next-generation identity and access management solutions are showing the way forward. An effective IAM approach will enable security organizations to separate signal from noise — managing and resolving a broad range of exceptions and system-admin failures. It also must fit your organization’s culture and operating model. On June 29-30, SC Media will convene an all-star team of identity security experts to discuss the role of IAM in Rethinking Your Organization’s Approach to Insider Threats. Topics will include:, including:

  • The fundamentals of Identity and Access Management
  • Tools and software that help combat insider threats
  • Why insider threats aren’t just tied to malicious employees

Register today for a fresh look at your organization’s approach to IAM, and its exposure to insider risk.

Virtual Conference

Data Privacy: Addressing today’s compliance demands

Data Privacy: Addressing today’s compliance demands July 13-14, 2021 10:30 am – 4:00 pm EDT As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Register for Data Privacy: Addressing today’s compliance demands
Data Privacy: Addressing today’s compliance demands

As legal and regulatory data protection frameworks have proliferated, it’s harder for organizations — of all sizes — to define and maintain a safe zone in which management and administration of sensitive data meets both business and government requirements. While some jurisdictions are clear, others are fuzzy; and the rules themselves are moving targets. Increased reliance on multi-cloud environments — in which sensitive data is more dispersed — raises the bar higher.

Join SC Media for a two-day virtual event from July 13-14 as a collection of security experts share advice on level-setting your data-privacy and security posture, and overcoming compliance challenges. Topics include:

• How to put privacy legislation in the service of your organization
• Understanding key requirements of recent data privacy regulations
• What are the common threat models that lead to data exposure

Aligning your security model with a strong data privacy policy is necessary to prevent breaches that put customers and employees at risk — and expose your organization to legal action. Register now.

Virtual Conference

Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability Management: Moving your organization from a tactical to a strategic posture July 20-21, 2021 10:30 am – 4:00 pm EDT Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

Register for Vulnerability Management: Moving your organization from a tactical to a strategic posture
Vulnerability Management: Moving your organization from a tactical to a strategic posture

Vulnerability management is a core cybersecurity discipline that encompasses scanning, assessment and prioritization. Scanning for weaknesses is not enough, especially when businesses are expanding their work-from-home populations, adopting cloud-first postures and introduce new technologies. Successful vulnerability management requires a coordinated program, continuously executed, from detection to remediation.

SC Media will host a two-day virtual event on this important topic from July 20-21. Join our faculty of vulnerability management experts as they share their experienceand explore the essentials, including:

• Designing a vulnerability management process from the ground up
• Identifying the tools, resources and processes that work best for your organization
• Setting risk-acceptance criteria

Establishing a vulnerability management program is a key step in your organization’s progress toward its ideal state of cybersecurity. Register now.

Virtual Conference

Advanced incident detection: Protecting your business from state-sponsored actors

Advanced incident detection: Protecting your business from state-sponsored actors August 10-11, 2021 10:30 am – 4:00 pm EDT It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Register for Advanced incident detection: Protecting your business from state-sponsored actors
Advanced incident detection: Protecting your business from state-sponsored actors

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 11-12 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

Virtual Conference

Maintaining endpoint security: New opportunities and new risks

Maintaining endpoint security: New opportunities and new risks August 25-26, 2021 10:30 am – 4:00 pm EDT Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

Register for Maintaining endpoint security: New opportunities and new risks
Maintaining endpoint security: New opportunities and new risks

Endpoint security has become an area of intense scrutiny and change over the past 12 months as the remote workforce has expanded and concerns over disappearing network perimeters have ramped up. Changing business cultures and cost structures are leading many organizations to view work-from-home and BYOD policies in a new light. But those who aim to lean into such opportunities must undertake a parallel rethink of their cybersecurity implications.

SC Media’s upcoming virtual event “Maintaining Endpoint Security: New Opportunities and New Risks” is designed to help organizations set a course for secure workforce growth and change following a year of disruption. This two-day event, August 25-26, convenes cybersecurity innovators and practitioners who will share their expertise and experience in addressing critical endpoint security issues, including:

• The problem of data-sharing and how to rein it in
• Determining the endpoint capabilities your organization needs to achieve its goals
• Understanding the top security threats for remote users

Now more than ever, the cybersecurity battle is being fought at the endpoint. Register today.

Virtual Conference

Multi-cloud security: Confronting the expanding dilemma of cloud architecture

Multi-cloud security: Confronting the expanding dilemma of cloud architecture September 14-15, 2021 10:30 am – 4:00 pm EDT As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Register for Multi-cloud security: Confronting the expanding dilemma of cloud architecture
Multi-cloud security: Confronting the expanding dilemma of cloud architecture

As more organizations embrace multi-cloud strategies, the architecture of choice has increasingly become a private / public hybrid. While such solutions offer flexibility and scalability — and support innovation — they bring complexity to IT security — including new challenges in authentication, data governance and security visibility, and a new requirements for the skills to address these issues.

Join SC Media on Sept. 14-15 for a two-day virtual conference that brings together industry leaders who will share their insights and experiences on the fast-changing world of cloud security. Topics covered will include:

•Determining whether native or third-party security solutions are the right approach for your environment
• Key compliance challenges you can expect and how to handle them
• What an effective defense looks like in a hybrid cloud environment

To evaluate the implications of your cloud architecture, register now.

Virtual Conference

Data Breach Response: Preparing for the inevitable security incident

Data Breach Response: Preparing for the inevitable security incident September 21-22, 2021 10:30 am – 4:00 pm EDT For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

Register for Data Breach Response: Preparing for the inevitable security incident
Data Breach Response: Preparing for the inevitable security incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

A quick and efficient response leads to a reduction of losses and quickly restored processes and services for an organization. Join SC Media for a two-day virtual conference from September 21-22 as experts on the topic share what optimal management of a cyber incident should look like. Topics include:

• Knowing when to call in a third-party vs. your own staff
• The role that cybersecurity insurance plays in incident response
• Developing a security culture that impacts your containment strategy

Incident response is all about the maturity and culture that’s developed by the security organization. Discover how to implement one that works for you. Register now.

Virtual Conference

Malware analysis: Taking incident-management to the next level

Malware analysis: Taking incident-management to the next level October 5-6, 2021 10:30 am – 4:00 pm EDT Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Register for Malware analysis: Taking incident-management to the next level
Malware analysis: Taking incident-management to the next level

Malware analysis is an increasingly important tool in an organization’s incident-management toolkit — enabling it to determine the source and potential impact of an intercepted virus, worm or trojan. Malware analysis can also help a target company assess damage and data loss, respond accordingly, and reset defenses going forward.

Please join SC Media for a two-day virtual conference — Oct. 5-6 — that will bring you up to speed on a capability of increasing relevance to companies across a broad range of sizes and sectors. Key discussion and presentation topics will include:

  • Proven tools and methodologies that detect and mitigate malware attacks
  • Establishing a malware analysis capability that suits your organization
  • A look over the horizon at tomorrow’s malware threats

To determine if malware analysis has place in your security plan, register now.

Virtual Conference

Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Are You Ready for Zero Trust? Securing your network by verifying and validating everything October 12-13, 2021 10:30 am – 4:00 pm EDT Since its introduction nearly a decade ago, the zero-trust security model has gradually made its way into cybersecurity’s mainstream. Zero trust’s opportunity — the increasing desire for silo-free, agile operating environments — also represents the biggest obstacle to its successful adoption: How does an organization enable free and open interaction while ratcheting up validation and verification to an absolute degree?

Register for Are You Ready for Zero Trust? Securing your network by verifying and validating everything
Are You Ready for Zero Trust? Securing your network by verifying and validating everything

Since its introduction nearly a decade ago, the zero-trust security model has gradually made its way into cybersecurity’s mainstream. Zero trust’s opportunity — the increasing desire for silo-free, agile operating environments — also represents the biggest obstacle to its successful adoption: How does an organization enable free and open interaction while ratcheting up validation and verification to an absolute degree?

Zero-trust security mandates authentication and continuous validation of all users, whether outside or inside an enterprise network, for them to receive and maintain access to applications and data. To ensure this level of security, zero trust leans heavily on core security disciplines such as multifactor authentication, identity and access management, and endpoint security technology.

To learn more about zero trust and to understand whether it’s right for your organization, we invite you to attend SC Media’s virtual conference “Are You Ready for Zero Trust?” on Oct. 12-13. At this event, top experts on the subject will provide perspective on key topics including:

• Organizational attributes likely to lead to successful adoption of zero trust
• Avoiding common pitfalls tied to implementation
• The role of an IT audit in the zero-trust adoption cycle

Discover whether adopting a zero trust model is the right next step in your organization’s cybersecurity evolution. Register now.

Virtual Conference

Cybersecurity Training and Awareness: The state of the human element in cybersecurity

Cybersecurity Training and Awareness: The state of the human element in cybersecurity December 6-7, 2021 10:30 am – 4:00 pm EDT The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today?

Register for Cybersecurity Training and Awareness: The state of the human element in cybersecurity
Cybersecurity Training and Awareness: The state of the human element in cybersecurity

The need for all-hands, no-exceptions cybersecurity training and awareness is beyond dispute. But what does a successful cybersecurity training and awareness program look like today?

SC Media will host a two-day event focused on this topic on Dec. 6-7 to help cybersecurity professionals design and implement the awareness and training program that’s right for their organization — its culture, counterparties, and employee community. This interactive learning program will feature experts on security awareness program development and technologies who will discuss the discipline’s state of the art and lead a deep dive on topics including:

  • Knowing the strengths and weaknesses of your workforce and turning them to your advantage
  • Building security into the fabric of your culture
  • Understanding the threat of business email compromise and why it persists

    To gain knowledge and perspective that will help you build cybersecurity buy-in from your company’s entry level to its C-suite, register now.