Date: Tuesday, December 19, 2017
Time: 12:00 p.m. New York / 5:00 p.m. London
Curtis Franklin, Editor, Security Now
This year has been a notable one in IT security. From ransomware to large-scale data theft, criminals and nation-state actors have taken a toll on business and government. While everyone takes a deep breath after surviving the year, there is huge concern about what lies ahead.
In this Security Now end-of-year webinar, we look at the major events and trends of 2017 and see where those trends are likely to lead in 2018. Will ransomware become more pervasive? Will DDoS attacks get bigger and more common? Is a military-grade attack on a national economy lurking in the background? We'll look at all these and more in an hour filled with information and predictions to help inform your action plans and buying decisions.
Join Security Now editor Curtis Franklin and Enterprise Cloud News editor Scott Ferguson as they look at the events of 2017 and talk about how those events are likely to work into trends for 2018. Along the way they'll wrap together predictions from experts around the industry to share the "consensus view" on what information security will look like in the coming year.
You'll also have a chance to voice your opinion in several webinar polls – and the question, answer and comment session that's a crucial part of every Security Now webinar. Join us for this look ahead at information security in the coming year and end 2017 on a productive note!
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Inside of Windows is a methodology called Encrypting File System. It works on individual files or folders, rather than at the whole disk level like BitLocker does.
Microsoft is doing something concrete about container security with the release of the Microsoft Application Inspector, a cross-platform tool whose primary objective is to identify source code features in a systematic and scalable way.
One threat actor is taking advantage of the current problems with Citrix ADC/Netscaler for their own advantage.
The European data infrastructure GAIA-X can help connect thedisparate needs of German firms and create market access for providers from the EU and beyond.
ARCHIVEDTop Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Tweets by Security_Now_
like us on facebook