Webinar Week 2014

5 Days. 5 Webinars. 5 CPE Credits.

We’re delighted to invite you to join us at Infosecurity Magazine‘s Webinar Week covering the latest global information security trends and challenges –join us live or on-demand, whenever suits your schedule. And, it’s completely FREE to attend so don't miss out, secure your place today.

Sessions Include:

Monday 10 November - Mitigating the Social Engineering Threat

The social engineer is a highly-skilled, highly-motivated adversary and for the information security professional who knows that the human factor is the biggest weakness in any multi-layered defense strategy, social engineering represents one of their biggest challenges.

Some of the most significant recent data breaches, from the high-profile attack on Target to the recent JP Morgan breach, are suspected to be the result of social engineering. So how can information security professionals protect their organization from the risk of social engineering – what are the policies, procedures and technologies that need to be in place to address the threat?

During this session, the panel will provide insight into how social engineers manipulate individuals and exploit security weaknesses, and share best practice on how to manage the risk.

  • Analyse how social engineers target specific information and collect, sort and utilise that data
  • Identify the factors that make an organization vulnerable to a social engineering attack
  • Determine how to develop systems, policies and procedures to protect your organization from social engineering
  • Learn  how to test your organization’s susceptibility to social engineering to identify weaknesses
  • Discover how to detect unintended disclosure of information on social networking sites
  • Access best-practice strategies to educate employees to protect against social engineering

Tuesday 11 November - Implementing Resilient Cybersecurity Incident Detection and Response

From the faster development of new technologies and products, to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense. However, as fast as business innovates, cybercrime does too – becoming increasingly sophisticated, organized and professional – driven by potentially huge financial rewards. Regardless of the measures an organization adopts to protect itself, it will be breached. Disconnecting from cyberspace is not an option, so to mitigate the cybercrime risk, organizations need to build resiliency to ensure that they respond and recover from an attack as rapidly and efficiently as possible, to limit the financial, operational and business impact.

This panel will discuss how to build resiliency and establish best practice approaches to implement an effective detection and response strategy within an organization

  • Evaluate measures and methodologies to determine whether an organization has been breached
  • Determine how to align an information security incident response strategy with the wider organizational strategy
  • Discover how to engage the wider business (PR, legal, marketing etc), partners and stakeholders in an incident response strategy and create a multi-disciplinary team from across the organization to rapidly respond to an attack
  • Identify the key elements of an effective governance framework to monitor cyber activity and the risks within the organization

Wednesday 12 November - DDoS: Protection and Response Strategies

The number, size and complexity of Distributed Denial of Service (DDos) attacks is increasing rapidly and as a result, organizations are struggling to keep pace with the threat. DDoS attacks can have a devastating impact on an organization’s website and with a host of free tools available to criminals online, the risk is ever increasing with recent high-profile attacks include those against Spamhaus and Sony Playstation.

As cyber-criminals innovate and develop new techniques to tackle defensive methods, it has never been more important for information security professionals to have strong, proactive defense and remediation strategies in place. During this webinar, the speakers will share insight on how to address the risks and respond to attacks.

  • Hear about the evolution of and motivations behind DDoS attacks and the attack vectors exploited
  • Discover how to implement multi-layered DDoS defense
  • Identify best practice detection and classification techniques
  • Discover how to implement resilient DDoS incident response practices

Thursday 13 November - Developing a Holistic Approach to Patch Management

Patch management continues to pose a huge challenge for information security practitioners as they grapple with the challenges of prioritising which vulnerability to patch first. Legacy systems, the speed of technological changes, and the sheer number of network devices and applications within an organization make patching a complex, costly and time-consuming task.

This practical webinar will provide attendees with the knowledge they need to develop a robust patch management strategy within their organization and integrate it into their wider security controls.

  • Discover how to integrate patch management into an information security and vulnerability management strategy
  • Understand how to evaluate vulnerabilities, prioritise patches and determine the timing of patch deployment
  • Dissect the compliance requirements related to patch management and how to meet these standards
  • Gain techniques and tactics to acquire, verify and audit patches

Friday 14 November - Cybersecurity Intelligence Sharing: Facilitating Breach Disclosure and Collaboration

As cybercrime outstrips the information security profession’s ability to tackle it, the need for increased collaboration between enterprises, governments and organizations has never been more important.

Actionable intelligence on current and future attacks is critical if organizations are going to be able develop effective risk mitigation tactics. The challenges to open collaboration are significant however, as organizations fear losing their competitive advantage, and governments fear national security. The lack of incentives to share information is also an inhibitor, as is the lack of a framework and common terminology. Whilst many informal information sharing networks exist between peers and colleagues, this has limited value for the sector as a whole.

As cybersecurity risks increase, how can governments, enterprises and organizations work together to share information that will arm them with actionable intelligence that will enable them to tackle their cyber-adversaries? There are some calls for mandatory reporting. In the EU it is already mandatory for communications providers to report breaches, with the planned  EU General Data Protection Regulation including a 24 hour breach notification clause. In the US, there there some disclosure laws, but they remain inconsistent. Does mandatory breach disclosure mean that the lessons learned will be disseminated to other organizations that can then benefit from them?

During this panel the speakers will look at how government, enterprises and organizations can co-operate to enable cybersecurity intelligence sharing.

  • Analyse the key challenges to cybersecurity collaboration and co-operation and how to overcome them
  • Understand the lessons that can be learned from the aviation and health sectors regarding incident reporting
  • Determine what a best practice framework for intelligence sharing would look like and a roadmap for industry to work towards this

Brought to you by

What’s hot on Infosecurity Magazine?