Sign up for our weekly newsletter!
A Look Ahead to Security in 2018

Date: Tuesday, December 19, 2017
Time: 12:00 p.m. New York / 5:00 p.m. London
Curtis Franklin, Editor, Security Now

This year has been a notable one in IT security. From ransomware to large-scale data theft, criminals and nation-state actors have taken a toll on business and government. While everyone takes a deep breath after surviving the year, there is huge concern about what lies ahead.

In this Security Now end-of-year webinar, we look at the major events and trends of 2017 and see where those trends are likely to lead in 2018. Will ransomware become more pervasive? Will DDoS attacks get bigger and more common? Is a military-grade attack on a national economy lurking in the background? We'll look at all these and more in an hour filled with information and predictions to help inform your action plans and buying decisions.

Join Security Now editor Curtis Franklin and Enterprise Cloud News editor Scott Ferguson as they look at the events of 2017 and talk about how those events are likely to work into trends for 2018. Along the way they'll wrap together predictions from experts around the industry to share the "consensus view" on what information security will look like in the coming year.

You'll also have a chance to voice your opinion in several webinar polls – and the question, answer and comment session that's a crucial part of every Security Now webinar. Join us for this look ahead at information security in the coming year and end 2017 on a productive note!


Curtis Franklin, Editor, Security Now
Curtis Franklin, Jr. has been writing about technologies and products in computing and networking since the early 1980s. He has contributed to a number of technology-industry publications including Dark Reading, InformationWeek Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, and on subjects ranging from enterprise security to mobile enterprise computing and wireless networking. Curtis is the author of hundreds of articles, the co-author of three books (including Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center), and has been a frequent speaker at computer and networking industry conferences across North America and Europe. When not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in amateur radio (KG4GWA), scuba diving, stand-up paddleboarding, and is a certified Florida Master Naturalist.

close this window

Mary Beth McGrath, Senior Vice President Global Talent Management, Level 3 Communications
Mary Beth McGrath is senior vice president of global talent management for Level 3 Communications. In this role, Ms. McGrath is responsible for the development and implementation of global talent strategies and programs, including corporate social responsibility, designed to attract talent and increase leadership and organizational capability. She and her team of talent management professionals enable the business to achieve its strategic objectives and deliver against the goal to be an employer of choice.

Ms. McGrath’s team also manages a global training curriculum that offers skill and compliance training to all employees, managers and leaders. To support Level 3’s organizational culture and the success and development of all individuals, the team provides a wide range of tools that support change management, career frameworks, employee surveys, performance management, 360 feedback, teambuilding and succession planning.

Prior to joining Level 3, Ms. McGrath held various HR leadership positions at First Data Corporation and PepsiCo.

Ms. McGrath holds a Bachelor of Science degree in finance from the University of Connecticut and an MBA from the University of New Haven.

close this window

Webinar Archive Registration

To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Email Address *
Username *
Create a Password
Re-enter Password
First Name *
Last Name *
Job Title *
Company *
Address *
City *
State / Province *
ZIP / Postal Code *
Country *
Phone Number *
What is your area of business? *
If you selected "Other" above, please clarify your answer.
What is your job function? *
If you selected "Other" above, please clarify your answer.
Company Annual Revenues *
Employees in entire organization *
Please indicate your agreement to the Privacy Policy and Terms of Use for this web site. *
I agree to abide by the Privacy Policy and Terms of Use.
Occasionally our sponsors may want to send you information about exciting new products and services. If you would like to receive these solicitations, please check this box.
Please indicate your agreement to Light Reading's Webinar Agreement for this webinar. *
I agree to abide by the Light Reading Webinar Agreement (printed in the box below).
Latest Articles
In a new paper released this week, two professors describe what they call the "crypto crumple zone," which looks to balance encryption and privacy with government's ability to investigate possible crimes.
A Ponemon survey finds a growing concern among cybersecurity professionals who work in the world's oil and gas industries.
UK-based Cambridge Analytica and its parent company are embroiled in controversy after amassing Facebook data on 270,000 users to influence election outcomes. Here's how to find out the dirt they have on you.
Besides the current crop of jobs AI is stealing, other InfoSec roles are also potentially next unless professionals safeguard their careers by repositioning their skills, say IT security and careers experts.
As billions of IoT devices are coming online, especially in healthcare, the security landscape is getting increasingly complicated, according to a report from Zingbox.
Flash Poll
upcoming Webinars
SD-WAN Security Best Practices: How to Achieve Security and Performance SLAs for Cloud Applications
Thursday, March 22, 2018
1:00 p.m. EST / 10:00 a.m. PST
CASBs: A Primer on Securing Your Cloud Environment
Thursday, March 29, 2018
1:00 p.m. EST / 10:00 a.m. PST
Information Resources
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with