A Look Ahead to Security in 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
This year has been a notable one in IT security. From ransomware to large-scale data theft, criminals and nation-state actors have taken a toll on business and government. While everyone takes a deep breath after surviving the year, there is huge concern about what lies ahead.
In this Security Now end-of-year webinar, we look at the major events and trends of 2017 and see where those trends are likely to lead in 2018. Will ransomware become more pervasive? Will DDoS attacks get bigger and more common? Is a military-grade attack on a national economy lurking in the background? We'll look at all these and more in an hour filled with information and predictions to help inform your action plans and buying decisions.
Join Security Now editor Curtis Franklin and Enterprise Cloud News editor Scott Ferguson as they look at the events of 2017 and talk about how those events are likely to work into trends for 2018. Along the way they'll wrap together predictions from experts around the industry to share the "consensus view" on what information security will look like in the coming year.
You'll also have a chance to voice your opinion in several webinar polls – and the question, answer and comment session that's a crucial part of every Security Now webinar. Join us for this look ahead at information security in the coming year and end 2017 on a productive note!
Curtis Franklin, Editor, Security Now
close this window
Curtis Franklin, Jr. has been writing about technologies and products in computing and networking since the early 1980s. He has contributed to a number of technology-industry publications including Dark Reading, InformationWeek Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, and ITWorld.com on subjects ranging from enterprise security to mobile enterprise computing and wireless networking. Curtis is the author of hundreds of articles, the co-author of three books (including Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center), and has been a frequent speaker at computer and networking industry conferences across North America and Europe. When not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in amateur radio (KG4GWA), scuba diving, stand-up paddleboarding, and is a certified Florida Master Naturalist.
Mary Beth McGrath, Senior Vice President Global Talent Management, Level 3 Communications
close this window
Mary Beth McGrath is senior vice president of global talent management for Level 3 Communications. In this role, Ms. McGrath is responsible for the development and implementation of global talent strategies and programs, including corporate social responsibility, designed to attract talent and increase leadership and organizational capability. She and her team of talent management professionals enable the business to achieve its strategic objectives and deliver against the goal to be an employer of choice.
Ms. McGrath’s team also manages a global training curriculum that offers skill and compliance training to all employees, managers and leaders. To support Level 3’s organizational culture and the success and development of all individuals, the team provides a wide range of tools that support change management, career frameworks, employee surveys, performance management, 360 feedback, teambuilding and succession planning.
Prior to joining Level 3, Ms. McGrath held various HR leadership positions at First Data Corporation and PepsiCo.
Ms. McGrath holds a Bachelor of Science degree in finance from the University of Connecticut and an MBA from the University of New Haven.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
Trend Micro has picked up on a new exploit dubbed 'Novidade,' which targets small business and home routers and changes their DNS settings to redirect the traffic as part of an attack.
A report from ESET finds 12 new Linux backdoor malware families in the wild that had previously been undocumented.
The MQTT and CoAP protocols that are crucial to IoT and IIoT operations have significant vulnerabilities that puts devices at risk, according to analysis from Trend Micro.
SD-WAN provides big benefits compared to traditional WAN connections between data centers and remote locations. However, authentication remains a concern. Here's why zero trust is a must.
Established threat groups and new players alike made for an active APTs scene this year, according to researchers with Kaspersky Lab.
12 Ways to Defeat Two-Factor Authentication (archive available soon)
Tuesday, December 11, 2018
12:00 p.m. New York / 5:00 p.m. London
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.
An interview with Steve Grobman, CTO of McAfee