Find out what's inside the August 2019 edition of the Journal & download a free copy of this month's featured article
Upcoming Web Conferences
It has been almost two decades since the roll out and formal adoption of SDLC methodologies. This session will cover how they have evolved and will continue to evolve.
Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?
As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what’s going on with security?
While GDPR and CCPA have been the focus for most professionals, legislation is not all about PII. Over the past year there have been…
The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.
The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.
This session will cover the traditional breach reports as well as a new style of reports and analysis.
Over the past few years, the focus has shifted from ‘does the code have vulnerabilities?’ to issues of ‘could the code have vulnerabilities?’ Of course, the later created the question – How would we know? Now, just when we thought we understood things, we realize that we are changing again. Not only is the code and its components are important, but so is the question of the development environment. This webinar will go over the state, changes, and new directions we are being faced with.
2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?
We as security professionals are faced with a multitude of dilemmas in the performance of our duties. These dilemmas range in nature including the following questions: what new technology do we need to protect against the latest threats, How much security do we put into our infrastructures and yet still not be obtrusive
While we continue to spend an ungodly amount of money on securing our infrastructure and trying to staff up security responders and improve corporate expertise, we are still getting hacked. Given that we do not have an unlimited budget and the availability of security expertise is extremely scarce, how can we survive? This webinar will bring us back to the basics with Key Risk Indicators and provide a way to re-think how we monitor and analyze residual risk.