IT Security Virtual Conferences | SC Media

Virtual Conferences

UPCOMING VIRTUAL CONFERENCES

Virtual Conference

Closing security gaps in hybrid and multi-cloud environments

Digital transformation initiatives have led many companies and organizations to adopt cloud services. While this has boosted operational agility and unlocked new revenue sources, it has left information security teams with multiple new environments to secure, test and monitor. Especially for those who work in hybrid or multi-cloud environments, understanding your organization’s cloud attack surface requires new thinking and may even demand a security overhaul. To be sure, achieving absolute visibility is always difficult, but innovative approaches, and new combinations of techniques and tools, are proving effective for organizations whose network extensions have left them outside their comfort zone.

Register for Closing security gaps in hybrid and multi-cloud environments

Sponsored by: Centrify, Code42, Entrust, Extrahop, FireMon, Imperva, Proofpoint, Rapid7, Sophos, VMWare

Closing security gaps in hybrid and multi-cloud environments

Digital transformation initiatives have led many companies and organizations to adopt cloud services. While this has boosted operational agility and unlocked new revenue sources, it has left information security teams with multiple new environments to secure, test and monitor.

Especially for those who work in hybrid or multi-cloud environments, understanding your organization’s cloud attack surface requires new thinking and may even demand a security overhaul. To be sure, achieving absolute visibility is always difficult, but innovative approaches, and new combinations of techniques and tools, are proving effective for organizations whose network extensions have left them outside their comfort zone.

For an upcoming eSummit focused on cloud security, CyberRisk Alliance has assembled an all-star roster of subject-matter experts and in-the-trenches pros to discuss proven approaches and solution-deployment challenges including:

  • Cloud computing’s unique authentication and access control issues.
  • Ensuring the security of “data at rest” in hybrid cloud environments.
  • Optimizing data-privacy compliance in the cloud.

Join us Oct. 21-22 for an immersive virtual learning and networking experience that will advance your understanding of cybersecurity in the cloud.

Virtual Conference

Gaining a Cybersecurity Edge with Threat Intelligence

Join SC Media on Wednesday, November 4, to help identify the benefits a threat intelligence program could provide for your organizationUnderstanding how threat actors think and operate is an essential component of blocking and remediating future digital assaults aimed at siphoning critical data or shutting down operations. This SC Media virtual conference will bring you up to speed and help identify the benefits a threat intelligence program could provide for your organization.

Register for Gaining a Cybersecurity Edge with Threat Intelligence
Gaining a Cybersecurity Edge with Threat Intelligence

November 4-5, 2020 10:30 am – 4:30 pm EDT

With an overabundance of threat information available, the burden is on the user organization to define an appropriate threat intelligence strategy and ensure its implementation. While larger enterprises may have the resources to allocate the security staff and technology required to sift and analyze the torrent of data, many with limited resources have walked away — leaving untapped the value it could provide to their security programs.

Understanding what threat intelligence can, and should, mean to your organization is the first step in successfully leveraging it. Join SC Media on Wednesday, November 4, to help identify the benefits a threat intelligence program could provide for your organization.

This learning and networking opportunity will give you the knowledge and context you need to define — or update — your approach. Key topics will include:

  • Integrating threat intelligence into your existing infrastructure
  • Training your team to maximize the value of threat intelligence
  • The latest in cybercrime (from COVID-19 exploits to political phishing and more).

Understanding how threat actors think and operate is an essential component of blocking and remediating future digital assaults aimed at siphoning critical data or shutting down operations. This SC Media virtual conference will bring you up to speed. Register now.


Virtual Conference

Zero Trust in Practice: The Art of the Possible

This new SC Media virtual conference will help you understand the leading strategic approaches to adopting a zero-trust model. The event will feature leading experts who will dive deep into the discipline’s key components, including a full zero trust architecture, where organizations struggle in reaching zero trust, gaining granular visibility into your network and much more.

Register for Zero Trust in Practice: The Art of the Possible
Zero Trust in Practice: The Art of the Possible

November 11-12, 2020 10:30 am – 4:00 pm EDT

Is it time finally for zero trust skeptics to take a closer look? Originally proposed by a Forester analyst in 2010, the zero-trust security model gained steam as high-powered companies like Google embraced it. But for most organizations, the concept remains daunting on its face: Continuous verification? Permission every data transaction? Create and enforce departmental barriers at a time when my company is trying to tear them down? For information security leaders at these companies, zero-trust models appeared to be well out of reach.

But the skeptics’ ranks may be thinning. With a majority of threats already known to emanate from within the enterprise walls, the castle-and-moat analogy once commonplace among security professionals is laughable. Meanwhile, the challenge of verifying the digital identities of a pandemic-dispersed workforce is leading an increasing number of security departments to adopt a zero-trust framework — one that takes seriously the challenge of bringing employees’ anywhere-anytime activities under control.

Zero Trust in Practice: The Art of the Possible — a new SC Media virtual conference — will tackle an increasingly important subject. Scheduled for November 11-12, this unique learning and networking opportunity will help you understand the leading strategic approaches to adopting a zero-trust model. The event will feature leading experts who will dive deep into the discipline’s key components, including:

  • A comprehensive review of a full zero trust architecture
  • Where organizations struggle in reaching zero trust
  • Gaining granular visibility into your network
  • How remote work creates an invisible perimeter

The security leader of today has no choice but to trust no one. Doing so may require a strategic approach. Register now.


Virtual Conference

New methods for protecting front-line devices

New methods for protecting front-line devices NOVEMBER 18 & 19, 2020 As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.

Register for New methods for protecting front-line devices

Sponsored by: Checkpoint, Slashnext, Sophos, VMWare

New methods for protecting front-line devices

As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.

Join the CyberRisk Alliance from November 18-19 for an endpoint security eSummit that brings together some of the leading minds in endpoint security that will dive deep on topics such as:

  • How endpoint threats are evolving
  • Why traditional approaches to endpoint security are dead
  • What sophisticated analysis techniques look like today

Endpoint security has evolved rapidly over the years. Tap into the thought leadership and resources featured in this two-day virtual conference to advance your security strategy today. Register now.

Virtual Conference

Prevent, detect and respond to ransomware

Prevent, detect and respond to ransomware DECEMBER 2 & 3, 2020 10:30 am – 4:00 pm EDT WannaCry put security leaders on notice when it comes to ransomware. Since then, attacks have skyrocketed, with the FBI reporting that businesses and individuals lost billions of dollars, due to cybercriminals’ use of malicious software. This remote, digital shakedown has quickly become the preferred method for many digital marauders to prey on all kinds of organizations.

Register for Prevent, detect and respond to ransomware

Sponsored by: F-Secure, Sophos, VMWare

Prevent, detect and respond to ransomware

WannaCry put security leaders on notice when it comes to ransomware. Since then, attacks have skyrocketed, with the FBI reporting that businesses and individuals lost billions of dollars, due to cybercriminals’ use of malicious software. This remote, digital shakedown has quickly become the preferred method for many digital marauders to prey on all kinds of organizations.

Deploying effective techniques and technology is critical to stopping ransomware before it’s deployed. In this upcoming CyberRisk Alliance eSummit centered on ransomware, threat intelligence experts will share their experiences and proven tactics on topics such as:

  • The most common initial infection vectors
  • How to limit a threat actor’s dwell time
  • Why backups and patches may be your best defense

Security organizations must be vigilant as the ransomware threat continues to proliferate. Building your own ransomware mitigation strategy involves learning from other incidents and hearing from experts that have responded to attacks. This virtual conference offers that opportunity. Register now.

Virtual Conference

Improve vulnerability and patch management strategies

Improve vulnerability and patch management strategies DECEMBER 16-17, 2020 Threat actors are known to take the path of least resistance when it comes to compromising organizations. This is why cybercriminals often focus on unpatched software vulnerabilities. For years, this has been a major issue for many organizations, and it continues to be the case. It’s no longer acceptable for vulnerability management to be given a comfortable routine approach.

Register for Improve vulnerability and patch management strategies

Sponsored by: Checkpoint

Improve vulnerability and patch management strategies

Threat actors are known to take the path of least resistance when it comes to compromising organizations. This is why cybercriminals often focus on unpatched software vulnerabilities. For years, this has been a major issue for many organizations, and it continues to be the case. It’s no longer acceptable for vulnerability management to be given a comfortable routine approach.

In this upcoming CyberRisk Alliance eSummit, centered on vulnerability assessment, some of the most prominent security leaders will be given a platform to share their approaches to tackling patch management issues, including:

  • Improving your visibility into vulnerability risk
  • Taking an intelligence-driven approach to prioritizing flaw mitigation
  • How to feed vulnerability data into other security solutions for enhanced intelligence

The modern-day security leader’s approach to vulnerability management must work in tandem with other security initiatives. To reach this ideal state of security and visibility, bolster your knowledge by registering for this event now.

Virtual Conference

APTs expanding reach: Understanding the risk of persistent threats

APTs expanding reach: Understanding the risk of persistent threats January 26 & 27, 2021 Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.

Register for APTs expanding reach: Understanding the risk of persistent threats
APTs expanding reach: Understanding the risk of persistent threats

Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.

How you invest, prepare and act today can make the difference when it comes to the threats you face tomorrow. Join CyberRisk Alliance for a two-day virtual conference, January 26-27, in which we’ll host the leading minds in threat tactics and analysis as they unpack key APT issues, including:

  • The techniques being deployed today for intrusion and exfiltration.
  • How to intercept possible APT attacks at any point in your network.
  • How to build a robust incident response plan.

This virtual conference offers you the opportunity to take a proactive stance and bolster your defenses. Register now.