SFIMA: August Educational Event: Learning to Savor User Behavior with Sharon Peng of Microsoft Clarity (Aug. 25th)
DARKReading: Implementing Zero Trust in Your Enterprise (June 21)
Tuesday, June 21st, 2022: 1:00 PM to 2:00 PM EDT
Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy.

Attend this webinar and you'll:

  • Formulate a practical checklist of how (and where) to start with implementing zero trust in your organization.
  • Anticipate potential pitfalls with zero-trust deployment and and be able to nimbly sidestep them.
  • Be better equipped to reduce your overall risk and make a big dent in your volume of false-positives.
  • Improve the overall threat posture of your organization as well as its data, applications, and end-users.

Hosted by DARKReading

InformationWeek: To Pay or Not to Pay? Solving for the Ransomware Risk Equation (June 22nd)
Wednesday, June 22nd, 2022: 1:00 PM to 2:00 PM EDT
You don't want to pay a ransomware attacker. You can't afford to pay a ransom, but can you afford NOT to pay it? CIOs ask themselves this question every day, and they rarely know the answer. Precious time is wasted while they try to determine the extent of the damage, the value of the data/assets impacted, the quality of backup systems, the opportunity costs of downtime, and more.

Attend this webinar, and you'll:

  • Dissect the experiences of other organizations victimized by ransomware to see how paying ransoms did or did not help.
  • Gain knowledge of new, sinister ransom requests, which ask for assets far more valuable than money.
  • Learn how to better assess all of these risks to protect your business from the impacts of this ransomware attack (and the next).

Hosted by InformationWeek

DARKReading: Vendors as Your Largest Business Email Compromise (BEC) Threat (June 22nd)
Wednesday, June 22nd, 2022: 6:00 PM to 7:30 PM EDT

The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.

Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them.

Hosted by DARKReading

DARKReading: How Data Breaches Happen (June 23rd)
Thursday, June 23rd, 2022: 11:00 AM to 5:15 PM EDT
Every day, the headlines are filled with news of major enterprises being hacked or infected with ransomware. From supply chain attacks such as SolarWinds or Kaseya to critical infrastructure breaches such as Colonial Pipeline, it seems that no organization is safe from cyber breaches. Is your organization ready to respond when it happens to you?

On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.

If you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you.

Hosted by DARKReading

Security Boulevard: AI and ML in Security (June 27th)
Monday, June 27th, 2022: 1:00 PM to 2:00 PM EDT
When artificial intelligence (AI) first arrived on the cybersecurity scene, there was understandably a lot of skepticism. Grandiose claims about the ability of AI platforms to eliminate the need for security analysts have given way to more rational assertions that focus on the role machine learning algorithms will play in augmenting the skills-and easing the strain on-cybersecurity professionals. The conversation has evolved as understanding has grown about what AI and machine learning can and cannot do in a cybersecurity context. Now, it isn't so much about whether AI will replace cybersecurity professionals as it is about how quickly AI models based on machine learning algorithms can be applied to help thwart attacks.

Hosted by Security Boulevard

DARKReading: Using Threat Modeling to Improve Enterprise Cyber Defenses (June 28th)
Tuesday, June 28th, 2022: 1:00 PM to 2:00 PM EDT
As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization's security.

Hosted by DARKReading

DARKReading:Outsourcing Cybersecurity: A Decision Maker's Guide (June 29th)
Wednesday, June 29th, 2022: 1:00 PM to 2:00 PM EDT
When it comes to cybersecurity, very few enterprises have all the skills and resources they need on staff. On today's market, your enterprise can outsource a wide variety of cyber tasks, from penetration testing to security monitoring to incident response. When does outsourcing make sense for your organization?

Hosted by DARKReading

CIO: SASE: The Quest to Manage and Secure Endpoints, Edge Services, and Cloud Resources (June 29th)
Wednesday, June 29th, 2022: 3:00 PM to 2:00 PM EDT
The modern enterprise is more complex than ever with workers, applications, and core infrastructure distributed from the core to the cloud and then to the edge. That's why many organizations seek a single, unified approach to manage users and devices, edge services, and both public and private clouds. Increasingly companies are deploying SASE cloud services to both manage and orchestrate their networks, security challenges, and edge services. They are looking to SASE to help transform infrastructure management, reduce TCO, and accelerate application modernization.

Hosted by CIO

Data Connectors: Virtual Cybersecurity Summit (June 30th)
Thursday, June 30th, 2022: 9:00 AM to 5:00 PM EDT
In this immersive, virtual environment, you will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.

The live, interactive environment of the NothEast Virtual Cybersecurity Summit will allow you to interact with representatives from some of the world's top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.

Hosted by Data Connectors

CSO: Future of Cybersecurity Summit (July 19-2022)
Tuesday, July 19th, 2022: 1:00 PM to 7:00 PM Wednesday, July 20th
How Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response

Anticipation. It's one of the U.S. Army's eight principles of sustainment, along with integration, responsiveness, simplicity, economy, survivability, continuity, and improvisation. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don't? Dwell time grows - and with it - exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.

Hosted by CSO

InteropDIGITAL: The Identity Crisis: How to Overcome Obstacles to Better Access Control (July 19th)
Tuesday, July 19th, 2022: 11:00 AM
Despite all the password leaks, credential stuffing attacks, data breaches, wasted time, and abandoned shopping carts, most businesses still rely on antiquated identity and access management systems. There are newer alternatives that provide both better security and an easier user experience. But overhauling an enterprise IAM system is full of obstacles.

Hosted by InteropDIGITAL

DARKREading: Building and Maintaining Security at the Network Edge (July 28)
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT
Advances in networking and new technologies have expanded the possibilities of deploying applications at the network edge. These edge devices bring with them their own security management challenges and risks. How do you scale your security to manage the sheer number of devices on the edge? In this webinar, experts discuss how to decide whether to move to the cloud or deploy to the edge. You will learn strategies and technologies for building out the edge securely and to manage the new workloads and applications effectively.

Hosted by DARKReading

IT - CxO Security Events

See all archived IT - CxO Security Events articles See all articles from this issue