PCI

In the Spotlight

So you think you know PCI? Are you certain?

Thursday April 06, 11:00 AM ET
More Info
x

PCI

So you think you know PCI? Are you certain? PCI is a lot more than just a checklist. Today's session addresses not only the goals for PCI, but also what you need to know about potential repercussions you might face if your company accepts payment cards and is breached. There is a standing joke that says that companies are PCI compliant – until they're not. It doesn't take much to fall out of compliance. Here's what you need to know about becoming compliant, staying compliant, and what happens when you're not compliant. 

Sponsored by:

Upcoming Virtual Conferences

Thu April 06, 11:00 AM ET

Virtual Conference

PCI

So you think you know PCI? Are you certain?

x

PCI

So you think you know PCI? Are you certain? PCI is a lot more than just a checklist. Today's session addresses not only the goals for PCI, but also what you need to know about potential repercussions you might face if your company accepts payment cards and is breached. There is a standing joke that says that companies are PCI compliant – until they're not. It doesn't take much to fall out of compliance. Here's what you need to know about becoming compliant, staying compliant, and what happens when you're not compliant. 

More Info
Thu April 20, 11:00 AM ET

Virtual Conference

Insider Threat

How do you stop employees – who think they're doing their job correctly – from putting the corporate network at risk? Here are some options.

x

Insider Threat

IT security departments are becoming more adept at building barriers to limit network attacks, but often the attack comes from within, not without. An employee might download confidential files to make them easier to access or perhaps save data to an insecure location. Not all attacks are malicious. So what do you do when your biggest threat comes from users with all the right credentials and access rights? How do you stop employees – who think they're doing their job correctly – from putting the corporate network at risk? Here are some options. 

More Info
Thu April 27, 11:00 AM ET

Virtual Conference

Data Security

Today's eConference will address how a company can go about developing a risk profile from which a data security plan can be designed.

x

Data Security

Developing "best practices" for data security is a bit like developing best practices for personal health. Everyone and every network is different, so one size fits none. Today's eConference will address how a company can go about developing a risk profile from which a data security plan can be designed. We will look at the key questions that need to be asked in order to build a profile of the corporate data and what kinds of security might be required based on the answers to those questions. 

More Info
Wed May 10, 11:00 AM ET

Virtual Conference

Tackling Vulnerabilities

This session will address how to make those decisions about prioritizing vulnerabilities and how to ensure delayed maintenance doesn't become ignored maintenance...

x

Tackling Vulnerabilities

Managing vulnerabilities generally falls to the chief risk officer. Do you tackle the lack of security updates for your legacy hardware and software or do you spend that same money on adding more layers of security around your corporate crown jewels? Understanding risk and making the decision on which vulnerabilities you should tackle first and which can be part of your delayed maintenance isn't a one-size-fits-all answer. It depends entirely on your individual circumstance. This session will address how to make those decisions about prioritizing vulnerabilities and how to ensure delayed maintenance doesn't become ignored maintenance. 

More Info
Thu May 18, 11:00 AM ET

Virtual Conference

Privacy and Security

For corporations, managing all of the different privacy laws – be they domestic or foreign – can be a nightmare, especially if you don't have a chief privacy officer...

x

Privacy and Security

You can hardly perform a business process today without invoking some kind of privacy law. It could be HIPAA, PCI or any one of a myriad of others. For corporations, managing all of the different privacy laws – be they domestic or foreign – can be a nightmare, especially if you don't have a chief privacy officer whose job is to know each and every privacy law. This eConference will offer some recommendations on how to manage privacy laws to ensure that not only is each customer or internal transaction compliant, but also that employees understand what is expected of them so they don't accidentally bypass critical privacy tasks. 

More Info
Thu June 01, 11:00 AM ET

Virtual Conference

Auditing and Compliance

This eConference will address the challenges of how companies can remain compliant in the cloud.

x

Auditing and Compliance

There are five key questions that must be addressed in order to meet most compliance requirements:
            1. What information is stored on a system?
            2. Where is the information stored?
            3. Who can access the system?
            4. What can they access?
            5. Is the access appropriate?
While this might seem obvious, it can be difficult to answer when data is stored in the cloud, especially when cloud service providers sometimes do not offer users the ability to place their own security controls on the servers in order to protect their data. This eConference will address the challenges of how companies can remain compliant in the cloud.
More Info
Wed June 14, 11:00 AM ET

Virtual Conference

ID Management

This virtual conference will address various approaches companies can employ to reduce security vulnerabilities by making better use of ID management techniques...

x

ID Management

Multifactor authentication is becoming a standard security component for corporations but, in some cases, companies need to take authentication a step further. For example, one approach to defeat a potential insider attack (or perhaps an outsider who has obtained an employee's credentials) is to require two executives to approve a transfer of money. Most banks support this technology, but if it was included in the original agreement between the bank and company, chances are companies might not be taking advantage of it. This virtual conference will address various approaches companies can employ to reduce security vulnerabilities by making better use of ID management techniques and technology. 

More Info
Wed June 28, 11:00 AM ET

Virtual Conference

Mobile security

This event will look at best practices for mobile security, including recommendations for CISOs on how to address the BYOD/mobile app conundrum.

x

Mobile security

We've all heard that many of the apps in the Apple App Store and Google's Android Play Store have malware packages. Apple and Google tell users only to use vetted applications, while IT departments tell users only to have corporate-approved applications on their mobile devices. This can be a challenge in a BYOD environment. This event will look at best practices for mobile security, including recommendations for CISOs on how to address the BYOD/mobile app conundrum. 
More Info

On-demand virtual conferences

Virtual Conference

Advanced persistent threats

What's occurring on the network while the IT team is trying to recover from a malware breach? Chances are, that malware breach is just a clever diversion.

x

Advanced persistent threats

The media today is filled with news of two kinds of attacks: ransomware attacks, where there is no doubt what the incursion is all about and what the cyberthief wants, and the low-and-slow advanced persistent threat. These seem like opposite ends of the spectrum, but might ransomware attacks actually be covering the tracks of an APT? What's occurring on the network while the IT team is trying to recover from a malware breach? Chances are, that malware breach is just a clever diversion. 
More Info

Virtual Conference

Leveraging threat intelligence

Here's how a forensics investigation works and why the "obvious" attacker isn't necessarily the culprit.

x

Leveraging threat intelligence

A corporate network has been hacked – apparently by an insider. The user's login and computer have both been identified as causing the breach. The only problem: the user has an air-tight alibi because he was out of the country when the breach occurred. The company calls in a forensic investigator to determine what really happened. Here's how a forensics investigation works and why the "obvious" attacker isn't necessarily the culprit. 
More Info

Virtual Conference

Web application security

This eConference looks at best practices for protecting web applications – from the development cycle to implementation to maintenance.

x

Web application security

Web application vulnerabilities expose companies to the greatest risks today. This SC Virtual Conference looks at best practices for protecting web applications – from the development cycle to implementation to maintenance.
More Info

Virtual Conference

SIEM

This virtual event will look at the current state of SIEM and address some of the evolutions the application has seen over the past few years, as well as exploring...

x

SIEM

SIEM, it seems, is becoming ubiquitous. Even SMBs are recognizing the value of a comprehensive event management monitor and reporting tool. But today's SIEM isn't the same application that you might have evaluated 3 to 5 years ago. New capabilities, new threats, new intelligence feeds, new vulnerabilities. All of these factors are changing the SIEM landscape. This virtual event will look at the current state of SIEM and address some of the evolutions the application has seen over the past few years, as well as exploring why it might be time to re-evaluate your network's security design. 
More Info

Virtual Conference

Insiders with Access

This discussion will look at some options for building in additional layers of security for insiders.

x

Insiders with Access

No one wants to assume that insiders are attacking a network, but all too often successful attacks use the login credentials of an actual employee. Sometimes, credentials are stolen via phishing scams. Other times the user's credentials might be compromised due to a weak password being guessed or because the user has been socially engineered to disclose the information. Certainly, security awareness training is important, but building in layers of security to challenge users who try to access certain types of data also can bolster security without necessarily bogging down the network or making access unacceptably difficult. This discussion will look at some options for building in additional layers of security for insiders. 
More Info

Virtual Conference

Cloud Security

Best practices for building layered security into a company's diverse environment.

x

Cloud Security

Securing data in the cloud isn't the same as securing it within your data center. Without having physical access to the servers, the IT security team needs to take a more creative approach to layered security. This is especially true when "cloud storage" isn't just provided by a single vendor, but multiple cloud-based service providers. Here are some best practices for building layered security into a company's diverse environment. 
More Info

Virtual Conference

Ransomware

Keynote: Liviu Groza, Director of IT Security and New Technology, Cape Cod Healthcare

x

Ransomware

We hear horror stories about users clicking on some malware-enabled payload and all of a sudden the network locks up and a cartoon character in a hoodie demands $100,000 in Bitcoins. Ransomware is indeed real, but is it the cyber-Armageddon that some claim it is? This virtual event focuses on the reality of ransomware, not the hyperbole, and will give you some actionable advice on how to defend against it.

 

More Info

Virtual Conference

Security Analytics

Keynote: John Galda, Director of Enterprise Risk and Security, Charles River Development Sponsor: Rapid7

x

Security Analytics

Breach detection is one of the most important considerations for security buyers. The field of security technologies claiming to find breaches or detect advanced attacks is deafening. Being able to visualize network activity and recognizing breaches and vulnerabilies in real time is fast becoming one of the keys to security analytics. This SC Virtual Conference will look at advances in the tools used for security analytics and address what still needs to be done to make this growing market more effective in delivering actionable intelligence.

More Info

Virtual Conference

Audit and Compliance

This SC Virtual Conference addresses how this catch-22 between compliance and security goals can be balanced.

x

Audit and Compliance

No one likes a visit from an auditor – not even in IT. But the role of the audit and compliance team is essential to ensuring that companies meet their legal requirements (the compliance component) while maintaining effective security (the audit process). Numerous automated tools are being developed for this but still one contradiction looms over everyone: Compliance does not guarantee security and security does not ensure compliance. This SC Virtual Conference addresses how this catch-22 between compliance and security goals can be balanced.

More Info

Virtual Conference

ID Management

This SC Virtual Conference will take a deeper dive into how biometrics is playing a larger role in multifactor authentication.

x

ID Management

Multifactor authentication includes something you know (login credentials), something you have (such as an RSA key), and something you are (biometrics). Biometrics is the fastest-growing component of this three-legged stool, with improvements to everything from iris scanning to facial recognition to behavioral analytics (such as how a user interacts with the input device). This SC Virtual Conference will take a deeper dive into how biometrics is playing a larger role in multifactor authentication.

More Info

Virtual Conference

Advanced persistent threats

This SC Virtual Conference will address the actions to take when a well-entrenched breach is identified, how to eradicate it, and how to follow the threads to find...

x

Advanced persistent threats

It is no longer a question of will you be breached but rather when and how. The key to surviving a breach is finding it quickly and taking the appropriate actions to eradicate them. But what happens if the breach you discover has been festering for a long time – months or perhaps years? How can you determine the damage the breach has done and all of the potential tentacles it has sent out throughout your network? This SC Virtual Conference will address the actions to take when a well-entrenched breach is identified, how to eradicate it, and how to follow the threads to find out how deeply this attack went into your network.
More Info

Virtual Conference

Endpoint Security

Keynote: Samer Adi, Cyber Security Officer, Capgemini - Canada Platinum Sponsor: Tripwire

x

Endpoint Security

Understanding every aspect of a company’s computing environment, including potential security weaknesses, is crucial for better protection, so it's no surprise that endpoint monitoring is gaining more prominence. But one challenge security professionals face is monitoring employee-owned devices. This is an even greater challenge with millennial employees who grew up with technology. This SC Virtual Conference will look at the challenges IT departments face in BYOD environments and tactics they can employ to better monitor endpoint devices.

More Info

Virtual Conference

Data Security

This SC Virtual Conference looks at the current state of application security and why treating the application as the "new perimeter" makes sense.

x

Data Security

The application layer is quickly becoming the most under-protected attack vector within the enterprise. While wrangling with the explosion of resident and web-based applications, organizations are balancing the need for greater security in their applications. This SC Virtual Conference looks at the current state of application security and why treating the application as the "new perimeter" makes sense.
More Info

Virtual Conference

Mobile Security

This SC Virtual Conference looks at what should be included in such policies and how to implement them successfully so that employees understand their benefits...

x

Mobile Security

Attorneys tell us that one of the most important first steps to developing a BYOD program is to develop an acceptable use policy that all employees who use personal devices must sign. However, there's a difference between having such a policy and making sure employees understand the full ramifications of the policy, how it impacts the company and how it will impact the employee as well. This SC Virtual Conference looks at what should be included in such policies and how to implement them successfully so that employees understand their benefits, limitations and responsibilities.
More Info

Virtual Conference

Web App Security

Keynote: Tom Brennan, CISSP, Founder and Managing Partner of ProactiveRISK

x

Web App Security

Research tells us that web application vulnerabilities are among the greatest risks companies have today. This SC Virtual Conference looks at best practices for protecting web applications – from the development cycle to implementation to maintenance.

More Info

Virtual Conference

SIEM

Keynote: Mike Epplin, Sr. Solutions Consultant, Intel Security Platinum Sponsors: Intel Security, Rapid7, Arctic Wolf

x

SIEM

Many data security departments are understaffed, under-budgeted and overworked due to increasing compliance and governance requirements – coupled with new regulations in the U.S. and E.U. addressing privacy and corporate responsibility. As a result, even small to midsize companies are looking into tools to better manage logs and threat intelligence. This SC Virtual Conference looks at the trend toward increased use of SIEM by midsize companies and the education, training and maintenance that goes along with log management and threat intelligence.
More Info

Virtual Conference

Securing the cloud

Platinum Sponsor: Blue Coat, Rapid7

x

Securing the cloud

The debate rages between which is more secure -- the datacenter or the cloud. In part this depends on what policies and procedures companies use to product data in transit to the cloud and how they store their data at rest in the cloud. This eConference looks at best practices to ensure data is secure in cloud and SaaS environments.
More Info

Sponsored by: SC Magazine

Virtual Conference

Leveraging Threat Intelligence

Keynote: Matthew Webster, Chief Information Security Officer, Healthix Platinum Sponsor: Intel Security

x

Leveraging Threat Intelligence

Threat intelligence is everywhere. It’s in your log files and those of other companies around the globe. Accessing treat intelligence, however, is not a simple task. This eSymposium will address how threat intelligence work and why collaboration of threat intelligence data is becoming more common across a variety of industries.
More Info

Sponsored by: SC Magazine

Virtual Conference

Auditing and Compliance

Keynote: Richard Moore,Managing Director with Alvarez & Marsal’s Financial Industry Advisory Services Platinum Sponsors: HP Enterprise, Ipswitch

x

Auditing and Compliance

It’s one thing to think you’re keeping your network secure and compliant. It’s quite another to be secure and compliant. This eConference will delve into the difference between security and compliance and how auditing both your own network and those of your service providers can ensure the security and compliance of your data.
More Info

Sponsored by: SC Magazine

Virtual Conference

ID Management

Keynote: Paul Munsen,Global Identity & Access Management Platform Lead, McDonald's Corporation

x

ID Management

Differentiating between the good guys and the bad guys on a network all comes down to ID management. It’s not enough to have valid credentials anymore — the bad guys have a lot of valid credentials. This eSymposium will address how impostors are identified and how legitimate users are able to access their data safely and securely, even when they are remote or using a variety of mobile devices.
More Info

Sponsored by: SC Magazine

Virtual Conference

Privacy and Security

Keynote: Gregory Wilson, Head of Information Security, 1st Global Platinum Sponsor: Hewlett Packard Enterprise

x

Privacy and Security

Is privacy vs. security a zero-sum game? Can we continue to enjoy our corporate or individual privacy and still be secure? Today’s eSymposium addresses the balance between privacy and security, as well as the challenge enterprises face while ensuring the privacy of records while complying with security mandates.
More Info

Sponsored by: SC Magazine

Virtual Conference

Tackling vulnerabilities

Keynote: Tom Kellermann, Cyber-intelligence expert Platinum Sponsor: Trend Micro

x

Tackling vulnerabilities

Networks are no longer homogeneous. Diverse hardware and infrastructure architecture makes the discovery of vulnerabilities more like a game of Tetris than simply scanning for open ports. This SC Virtual Conference will address how vulnerabilities can be identified and mitigated even in the most complex IT environments.    

More Info

Sponsored by: SC Magazine

Virtual Conference

Advanced monitoring and forensics

Keynote: Rebecca Gurley Bace, Chief Strategist for the Center for Forensics, Information Technology and Security (CFITS)

x

Advanced monitoring and forensics

It’s one thing to identify a breach exists; it’s quite another to dig deeply into the bowels of the affected system to see who committed the breach, how they did it, and perhaps even the ongoing status of the breach in progress. This eSymposium looks at how monitoring and digital forensics can unlock the secrets of a data breach and bring hidden details to light.
More Info

Sponsored by: SC Magazine

Virtual Conference

Cyberespionage

Keynote: Ari Schwartz, Managing Director of Cybersecurity Services, Venable LLC Platinum Sponsor: TrendMicro

x

Cyberespionage

Is there a difference between those attackers involved in cyberespionage and run-of-the-mill cybercriminals? Does it matter? This SC Virtual Conference will look at various approaches state-sponsored and corporate cyberespionage attackers use to penetrate corporate networks. Our experts will present a number of recommendations that companies can take today to defend themselves from these malicious attacks.    

More Info

Sponsored by: SC Magazine

Virtual Conference

Mobile Security

Keynote: Mitch Parker, CISO, Temple University Health System Platinum Sponsors: CA Technologies, Centrify

x

Mobile Security

There was a time every computer user used a desktop system or terminal. We call that ancient history. Today's user might have a laptop, tablet, cell phone or two, and other specialized mobile device that is customized to their job responsibility. data is mobile and must be rendered across multiple platforms, but it also has to be secure across multiple platforms as well. This eSymposium will address strategies companies can take to ensure that their data is safe, no mater where or how it is accessed.

More Info

Sponsored by: SC Magazine

Virtual Conference

Advanced persistent threats

This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable...

x

Advanced persistent threats

It is no secret that bad guys are attacking your network every day. Nor should it surprise anyone that bad guys are already inside your network looking for data to exfiltrate. This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable corporate data. We also will look at approaches to identify potential attacks vectors so that the security can focus on the anomalies while allowing regular business traffic to pass through the network.
More Info

Sponsored by: SC Magazine

Virtual Conference

How cybercriminal gangs work

Keynote:Eric Shiffman,Task Force FBI Chicago Division Platinum Sponsors: HPE, TrendMicro

x

How cybercriminal gangs work

Movies are wonderful diversions, but they fail miserably in showing how cybercriminal gangs really work. These gangs are not just based in dark rooms in China or Russia, but sometimes they thrive in breezy cafes in the United States. This eSymposium will look at the different types of cyberattacks (ransomware, corporate espionage, state-sponsored, hacktivists, and others), what motivates cybercriminals, and various approaches companies can take to make their data less interesting to these gangs.     

Keynote Session
Eric Shiffman
Supervisory Special Agent – Criminal Cyber Investigations / Task Force FBI Chicago Division

Platinum Sponsors:
Hewlett Packard Enterprise
TrendMicro

                                                                                                                                                                                                 

More Info

Sponsored by: SC Magazine

Virtual Conference

PCI Compliance

Protecting PII was difficult enough when US-based consumers thought it was done by mirrors and magic.

x

PCI Compliance

Protecting PII was difficult enough when US-based consumers thought it was done by mirrors and magic. For the past six months, consumers have had hands-on experience with chip-protected bank cards, yet data breaches still occur. This eConference will look at how PCI compliance is changing due to pressures from consumers on one side, corporate management that finally is starting to take data security seriously, and the CISO in between them who must implement bank card security while balancing the pressures from consumer and management.
More Info

Virtual Conference

Web Application Security

This eSymposium looks at various web application security approaches and how you can protect your data and applications in the cloud.

x

Web Application Security

The eggshell is broken. Bad guys are inside your network. Now it’s time to rethink how you protect your data and your applications — especially in the cloud. Even when the bad guys are able to breach your cloud-based software, it only is valuable if they can monetize it. This eSymposium looks at various web application security approaches and how you can protect your data and applications in the cloud.
More Info

Sponsored by: SC Magazine

Virtual Conference

SIEM

This eSymposium on SIEM will addresses the challenges companies face in making sure their log files are providing the data they need to make educated decisions...

x

SIEM

Having great log data is great. Actually making the data actionable is something else. This eSymposium on SIEM will addresses the challenges companies face in making sure their log files are providing the data they need to make educated decisions based on accurate and useful information. It also will address the perennial questions: Is SIEM dead?
More Info

Sponsored by: SC Magazine

Virtual Conference

Cloud Security

This eSymposium will look at the potential storm brewing around whether or not your service provider's cloud is secure.

x

Cloud Security

As the cliché goes, “Everyone talks about the weather but no one does anything about it.”  This eSymposium will look at the potential storm brewing around whether or not your service provider's cloud is secure. There is a natural dichotomy between cloud providers that want to limit their risk and their customers that rely on the provider to supply appropriate security. As a result, cloud security often comes down to two main discussions: trust with verification and the Service Level Agreement. Today we will look at how customers can negotiate the murky waters of the Terms of Service and the Service Level Agreement in order to feel secure with their chose cloud provider.
More Info

Sponsored by: SC Magazine

Virtual Conference

Insiders with Access

This eSymposium will look at various physical and logical security approaches the CISO can take to protect corporate data.

x

Insiders with Access

Most companies don’t make a federal case out of an employee going home with a company pen or extra tablet of paper. But it quite possibly could become a federal case if the employee walks out with the company’s intellectual property or customer database to sell to a competitor or foreign agent. This eSymposium will look at various physical and logical security approaches the CISO can take to protect corporate data. The discussion will range from multifactor authentication and controls for physical access to data, as well as identity, credential and access management defenses that logically provide defenses.
More Info

Sponsored by: SC Magazine

Virtual Conference

Cyber Threat Intelligence

Here, for your consideration, are some thoughts on how to improve and expand your threat intelligence operations.

x

Cyber Threat Intelligence

Cyber threat intelligence is one of the keys to unlocking potential attacks by state-sponsored attackers and criminals alike. If you understand how, where and why an attacker will try and breach your network, you can build defenses that identify and shut down the attacks quickly. The question becomes how do you obtain the requisite intelligence you need. What, for example, can the deep web and other outside intelligence troves tell us about emerging threats? What policies, procedures and processes can enterprises employ today to improve the analysis of data they already have in their log files, SIEMs and beyond? Here, for your consideration, are some thoughts on how to improve and expand your threat intelligence operations.
More Info

Sponsored by: SC Magazine

Virtual Conference

Hacktivism

These vigilante-style, politically motivated attacks are meant to embarass executives by publicizing their secret dealings.

x

Hacktivism

These vigilante-style, politically motivated attacks are meant to embarass executives by publicizing their secret dealings. What can authorities do to go after those behind these illegal activities, and how can corporations better protect themselves so incidents such as those that happened at the NSA, RSA, Twitter, PayPal, Sony, Pfizer, the FBI, a number of police forces, the U.S. military and many other entities, doesn't happen to them? We'll take a deep dive.
More Info

Sponsored by: SC Magazine

Virtual Conference

Vulnerability Management

Cybercriminals frequently take advantage of vulnerabilities in web and other applications to gain entrance to wider corporate infrastructures. We learn from experts...

x

Vulnerability Management

Cybercriminals frequently take advantage of vulnerabilities in web and other applications to gain entrance to wider corporate infrastructures. We learn from experts what companies can do to mitigate against these threats.
More Info

Sponsored by: SC Magazine

Virtual Conference

ID Management

We will survey how security professionals can best safeguard cloud-based applications, critical databases and more via ID management tools and techniques.

x

ID Management

We will survey how security professionals can best safeguard cloud-based applications, critical databases and more via ID management tools and techniques.
More Info

Sponsored by: SC Magazine

Virtual Conference

Advanced Persistent threats

Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague...

x

Advanced Persistent threats

Cybercriminals enlisting APTs are patient and much more technically advanced than the common cyberthief. These more sophisticated and motivated miscreants infiltrate networks and surreptitiously steal critical data bit by bit, day by day, month by month. If a company reacts too hastily after discovering them, the bad guys can quickly modify the coding on which their attacks are based and regain anonymity. Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague. 
More Info

Sponsored by: SC Magazine

Virtual Conference

PCI

This eConference will update you on the latest guidance from the PCI Security Standards Council.

x

PCI

This eConference will update you on the latest guidance from the PCI Security Standards Council. Guest speakers explore current guidance around data protection for mobile, cloud and other vectors.
More Info

Sponsored by: SC Magazine

Virtual Conference

Data Security

With IT infrastructures proving less centralized these days, so too is critical data.

x

Data Security

With IT infrastructures proving less centralized these days, so too is critical data. What are organizations doing, then, to make sure the most important data they trade in is protected from cybercriminals taking advantage of the myriad vulnerabilities introduced by ever-widening mobile and decentralized environments?
More Info

Sponsored by: SC Magazine

Virtual Conference

Mobile Security

What about all those applications that end-users keep downloading to their smartphones, laptops and smartwatches?

x

Mobile Security

This is the hot topic of the day. What about all those applications that end-users keep downloading to their smartphones, laptops and smartwatches? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We'll provide some answers.
More Info

Sponsored by: SC Magazine

Virtual Conference

Web application security

We review what organizations are missing when it comes to the privacy and security issues regarding the use of social media and find out what they can do to better...

x

Web application security

With social networking a part of everyday business, companies readily have embraced their tweets and Facebook updates to reach out to customers and others. But, the malware and social engineering attacks that cybercriminals have introduced on these sites still prove effective. We review what organizations are missing when it comes to the privacy and security issues regarding the use of social media and find out what they can do to better their approaches. 
More Info

Sponsored by: SC Magazine

Virtual Conference

SIEM

We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.

x

SIEM

Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what’s happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations’ infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
More Info

Sponsored by: SC Magazine