Welcome to ISMG's compendium of RSA Conference 2022. The 31st annual conference covered a wide range of topics including cybercrime, cyberwarfare, zero trust, supply chain risk, ransomware, OT security, cyber insurance and jobs. Access 150+ interviews with the top speakers and influencers.
The global fraud landscape has shifted dramatically in the past year. Uri Rivner and Erin Englund of BioCatch discuss the urgency of catching money mules, stopping synthetic IDs and schemes that result from deep social engineering.
Increased reliance on the agile and remote work model has created more opportunities for MSPs. WatchGuard CEO Prakash Panjwani shares advice on how to engage an MSP that fits into the organization’s business model and establish a good partnership.
Today's threats are more sophisticated than ever and despite significant investment in prevention technologies many organizations continue to suffer damaging attacks. Join Dave Martin, Open Systems' Senior Director of Product Management- Threat Response as he share best practices model to minimize risk that combines...
As we approach 2021, the global pandemic brings a laser-focus to both risk and user experience. Digital transformation and demand for flexible, secure access drives our need for machine-scale, frictionless authentication and continuous authorization to prove digital identities match the humans behind them. Dr. Shook...
Andy Bates, executive director of the Global Cyber Alliance, shares his insights on key cybersecurity and fraud challenges facing UK organizations in the year ahead, with an emphasis on:
Emerging threats
IoT vulnerabilities
How defenders and defenses must adapt
As global CISO of one of the world's oldest and largest consumer goods enterprises, Bobby Ford sees not only the accelerated journey cybersecurity leaders have experienced in 2020, but also where the trip may be headed in 2021. In this exclusive keynote interview, Ford discusses the challenges of the current year and...
Jasbir Solanki, CEO of the Homeland and Cyber Security division of Mahindra Defense System Limited, likes to call his group "The special services of cybersecurity." In this exclusive session, Solanki shares his unique perspective on what to expect in 2021, including:
Lasting impacts of COVID-19
Evolving threats...
2020 saw major challenges for the world, not least for the cybersecurity industry. So as organizations and societies recover from pandemic-battling postures, what strategic adjustments and controls must CISOs employ as we enter 2021, particularly at a time when resources may be limited and uncertainty looms? Join this...
Modern cyberattacks are not limited to network intrusions from outside by hackers. "Internal threat actors" can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.
The Zero Trust model, based on the simple principle of...
The global pandemic has accelerated digital transformation and cloud adoption for all organisations. This journey to cloud has created some challenges for the security teams, who already are overwhelmed with volumes of security events and suffering with the security data spread across multiple tools, clouds and IT...
In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.
In this exclusive panel...
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the...
Security orchestration, automation, and response (a.k.a. SOAR) is the cool kid on the block in security right now. Implementing SOAR requires a both a strategic and a tactical approach, in order to avoid pitfalls and ensure ongoing success. The benefits of SOAR are many-fold - such as improving operational efficiency...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.