Moderator, Infosecurity Magazine

Stephen Pritchard

In this session learn: • Why security teams must operate at the high speed of business innovation • What challenges security functions must overcome in the face of business advancement • How to maintain efficient security processed in a data-driven age

In this webinar, industry experts will outline a password benchmark for your business and explore how to leverage it for the betterment of your organization.

APIs are becoming ever more important, and making sure those APIs stay secure is critical

Friday May 12 may yet be seen as a turning point for global IT security.

In 2017, more focus will be on hyper-realistic cyber simulation which draws from next-generation training methodologies.

As urban populations grow, public authorities are looking for new ways to deal with congestion, pollution and crime. Applying Internet of Things (IoT) technologies, sensors, and low-power, wide area (LPWA) networks gives administrators a much more detailed and up-to-date picture of what is happening in the city.

Scratch the surface of the public internet and you'll quickly descend into the world of the deep and dark web. A place where secrets, malware and exploits are traded might not be a place where corporate teams want to tread.

Threat hunting is one of the hottest topics in cyber security right now. And in the right hands, threat hunting is a significant weapon in the IT security arsenal, helping organizations to identify adversaries and the risks they pose.

The traditional SOC – security operations center – is struggling under the strain of increasing cyber security threats, and the rapid growth of security alerts and security data.

Encryption, network virtualization and the imminent GDPR can be very complex issues for organizations to stay on top of. Security professionals need to think about security across clouds and how to utilize the virtualization layer as a security enabler.

Enterprise mobile journeys should ideally culminate in a digital workspace, where any device – smartphones, tablets and PCs – access any app with seamless single sign-on and strong authentication.

Can organizations turn this on its head, and instead use security intelligence to gain insights and to connect, unite and enable business processes?

Waves of high-profile breaches and new breach notification legislation is setting the scene for a huge growth in cyber insurance take-up, but do organizations know what is, and what isn't, covered?

The rise of Shadow IT within businesses is leading to more attacks and security incidents, due to the use of unknown or shadow assets and applications.

After breaches, data loss, major bugs and now the GDPR hit the headlines, senior members of the board are becoming more interested in cyber security, and are beginning to make budget and resource available.