Today's threats are more sophisticated than ever and despite significant investment in prevention technologies many organizations continue to suffer damaging attacks. Join Dave Martin, Open Systems' Senior Director of Product Management- Threat Response as he share best practices model to minimize risk that combines...
As we approach 2021, the global pandemic brings a laser-focus to both risk and user experience. Digital transformation and demand for flexible, secure access drives our need for machine-scale, frictionless authentication and continuous authorization to prove digital identities match the humans behind them. Dr. Shook...
Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
Emerging threats
IoT vulnerabilities
How defenders and defenses must adapt
Jasbir Solanki, CEO of the Homeland and Cyber Security division of Mahindra Defense System Limited, likes to call his group "The special services of cybersecurity." In this exclusive session, Solanki shares his unique perspective on what to expect in 2021, including:
Lasting impacts of COVID-19
Evolving threats...
As global CISO of one of the world's oldest and largest consumer goods enterprises, Bobby Ford sees not only the accelerated journey cybersecurity leaders have experienced in 2020, but also where the trip may be headed in 2021. In this exclusive keynote interview, Ford discusses the challenges of the current year and...
Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.
The Zero Trust model, based on the simple principle of...
2020 saw major challenges for the world, not least for the cybersecurity industry. So as organizations and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter 2021, particularly at a time when resources may be limited and uncertainty looms? Join this...
The global pandemic has accelerated digital transformation and cloud adoption for all organisations. This journey to cloud has created some challenges for the security teams, who already are overwhelmed with volumes of security events and suffering with the security data spread across multiple tools, clouds and IT...
Join this session to learn about IBM Cloud Pak for Security, an open platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritise your team's time. With IBM Cloud Pak for Security you can:
Gain Security insights: connect to your existing data sources to generate deeper...
Security orchestration, automation, and response (a.k.a. SOAR) is the cool kid on the block in security right now. Implementing SOAR requires a both a strategic and a tactical approach, in order to avoid pitfalls and ensure ongoing success. The benefits of SOAR are many-fold - such as improving operational efficiency...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the...
In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.
In this exclusive panel...
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
Business Email Compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through to 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises. How can CISOs respond to this ever increasing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.