Recorded Future's Predict 21 (Oct 12-13)
Tuesday, October 12th, 2021: 11:00 AM to 3:00 PM Wednesday, October 13th, 2021
In today's uncertain world, where every connection and access point is an opportunity for adversaries, intelligence is the only equalizer, providing the visibility to make faster, smarter, more confident decisions.

With more sessions, more speakers, and more opportunities to learn than ever before, we'll explore intelligence-led security and the increasingly blurred lines between physical and digital worlds.

It's time to think differently about cybersecurity. It's time to act with confidence in an uncertain world.

Hosted by Recorded Future

DARKReading: How Security Vulnerabilities Are Introduced In the Application Development Process - And How to Stop It (Oct 12th)
Tuesday, October 12th, 2021: 1:00 PM to 2:00 PM
In this Dark Reading webinar, top application security experts outline some of the most commonly-occurring vulnerabilities and offer insight on how and why these flaws are introduced during software development. Attendees will learn about tools and practices for eliminating these vulnerabilities, and receive advice and recommendations on how to improve the development process to find and fix application security flaws - before the code is deployed.

Attend this webinar and you'll:

  • Learn how common code bugs often get by in the development process
  • Find out more about some of the most commonly-occurring vulnerabilities
  • Get advice for which tools and practices can help eliminate software vulnerabilities
  • Leave with recommendations on how to improve the development process to find and fix application security flaws

Hosted by DARKReading and Checkmarx

Scottsdale 2021 Virtual Cyber Security Summit (Oct. 13th)
Wednesday, October 13th, 2021: 8:00 AM to 5:10 PM
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation's leading solution providers and discover the latest products and services for enterprise cyber defense.

  • Virtual Exhibit Hall Opens - Solution Provider Demonstrations Begin
  • Opening Security Briefing with the Cybersecurity and Infrastructure Security Agency (CISA), US DHS
  • Opening Security Keynote with Darktrace: The Next Generation of Cyber Security: Autonomous Cyber AI
  • Presenting Security Keynote with SonicWall
  • Verizon Presentation: More Signal, Less Noise: Mapping The VERIS Framework To MITRE ATT&ACK
  • Solution Provider Demonstrations in the Virtual Exhibit Hall
  • Code42 Presentation: Insider Risk Management - The Alternative to Traditional Data Protection
  • ExtraHop Presentation: Building a Response Strategy to Advanced Threats
  • Panel 1: The Future of Cloud Security
  • HYPR Presentation: The State of Passwordless Security
  • Solution Provider Demonstrations in the Virtual Exhibit Hall
  • Arctic Wolf Presentation: Current State of Security Operations
  • Reciprocity Presentation: Achieving New Levels of Efficiency, Automation & Visibility in Third-Party Risk Management
  • Panel 2: Identifying & Avoiding Insider Threats in Today's Remote Workforce Age
  • Solution Provider Demonstrations in the Virtual Exhibit Hall
  • Cisco Secure Endpoint Presentation: Stopping Ransomware - Two is Better Than One
  • Abnormal Security Presentation
  • CrowdPoint Presentation: Zero Trust Defense in Depth
  • Solution Provider Demonstrations in the Virtual Exhibit Hall
  • Panel 3: Ransomware on the Rise - Utilizing Zero Trust to Avoid Becoming a Hostage to Cyber Criminals and What to Do if You Fall Victim to an Attack
  • Cyber Security Summit Exclusive Closing Keynote Presentation: "Looking through the Eyes of the Cyber Attacker" Presented by The NSA

Admission is just $95 giving you access to all Keynote Discussions, Interactive Panels and Product Demonstrations. As as subscriber to this newsletter use code ITEVENTS21VIP for free admission.

ITProtoday: Cloud Security Architecture: Designing a Trusted Framework (Oct 14th)
Thursday, October 14th, 2021: 11:00 AM to 4:00 PM
Numerous factors are converging to weaken the castle-and-moat approach to cloud security. In its place, zero trust architectures are becoming increasingly popular to help companies defend against diverse attack vectors including insider threats. But where is the line between zero trust and overburdening users?

Hosted by ITProToday, InformationWeek, Informa

DARKReading: Using Threat Hunting and Threat Intelligence to Strengthen Enterprise Cybersecurity (Oct 19th)
Tuesday, October 19th, 2021: 1:00 PM to 2:00 PM
IT security teams are rapidly learning that an effective cyber defense means gaining a better understanding of attackers and the methods they use. In this Dark Reading webinar, top experts offer insights on how your organization can use emerging tools and practices such as threat hunting and threat intelligence to learn more about potential adversaries and proactively identify potential attacks. Attendees will also learn how they can combine these tools and practices to create an even more effective defense.

Hosted by Dark Reading and cybersixgill

Getting Secure Access Service Edge (SASE): What Every Enterprise Should Know (Oct 27th)
Wednesday, October 27th, 2021: 11:00 AM to 5:15 PM
This unique, information-packed event looks at some of the key strategies an IT organization will need to consider as it moves into the SASE generation of technology and services. Leading SASE technology developers, service providers, and IT practitioners who have pioneered this new wave of networking and how it works in real-world IT environments will provide their latest insights and recommendations.

Hosted by Informa USA

    CIO: Zero Trust Data Management (Oct 27th)
    Wednesday, October 27th, 2021: 1:00 PM to 2:00 PM
    As organizations struggle with the 'perimeter free' defensive posture of the future, the use of a zero-trust approach to various aspects of cyber-security has become a 'go-to' approach. This NIST standard is well suited for modern cyber-defense strategies. For many organizations the focus has been on access management, but more can be done. Extending zero-trust techniques to data management delivers many benefits and improves the security posture of the organization.

    Deploying a zero-trust data management solution fits the current reality. For example, rather than depend on a 100% success rate for preventing intrusion, this new approach assumes that a breach or ransomware attack is likely and protects the data backups from it. This makes it possible to recover more quickly. A critical benefit from this approach is that it is now possible to determine the 'blast radius' or what data has been compromised. This allows SecOps or IT teams to protect data that hasn't been impacted and focus on only the compromised data. More importantly, zero-trust data management ensures that backups are protected and remain intact so they can be used to reduce the time necessary to resume operations.

    Hosted by CIO and Rubrik

    CSO50 Conference + Awards (Nov. 16-18th)
    Tuesday, November 16th, 2021: 1:00 PM to 4:00 PM Thursday, November 18th, 2021
    Remote work has opened the door to a range of risks, not the least of which is intellectual property theft. And ransomware attacks - enabled by easily available as-a-service tools - happen with more frequency than ever.

    Our agenda includes keynotes, talks, and conversations that will inform, answer, enlighten, inspire, solve, and prepare you for the challenges ahead. Session topics are carefully selected to be of maximum value.

    Hosted by CSO

      IT - CxO Security Events

      See all archived IT - CxO Security Events articles See all articles from this issue