Loading images...
Loading images...
Loading images...

Sept 2016 – Using Strong Processes to Counter Emerging Cyber Threats – CISO Panel

What are Chief Information Security Officers (CISOs) and their information security personnel to do when facing the evolving threat landscape and, simultaneously, demands from enterprise leaders (and customers) to achieve the highest levels of integrity, confidentiality, and availability?  Experienced CISOs understand these challenges and rise above them to achieve organizational objectives and operational excellence. They […]

June 2016 – Ransomware: The Next Wave of Malware is Here

Ransomware is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system’s hard drive, which become difficult or impossible to decrypt without paying the […]

September 2013 - Risk-Based Security Management

September 2013 – Risk-Based Security Management

Date Wednesday, September 18, 2013 Event Start Time – End Time 2:00 – 5:00 pm Overall Event Title RISK-BASED SECURITY MANAGEMENT  (Register) Event abstract Risk-Based Security Management (RBSM) is defined as the application of rigorous and systematic analytical techniques to the evaluation of the risks that impact an organization’s information assets and IT infrastructure. RBSM […]

May 2013 – Social Engineering: Strategies, Methods and Tactics.

May 8, 2013 – ISSA PROGRAM   Date May 8, 2013 Event Start Time – End Time 2 PM – 5 PM Overall Event Title Social Engineering: Strategies, Methods and Tactics. Event abstract Despite the efforts of security professionals, information everywhere remains vulnerable and continues to be the centric target of malicious actors.  While enhancements […]

How to Leverage Next Generation Threat Intelligence?

STIX Overview – NYC ISSA Threat Intel Event – Mar 2013 FSISAC-EVOLUTION-CYBER-THREAT-INTEL-201303020-final-santized issa-march2013-md5-threatintel CITP Summary of Key Findings 18JAN13 March 2013 – ISSA PROGRAM Date Wednesday, March 20, 2013 Event Start Time – End Time 2:00 – 5:00 pm Overall Event Title How to Leverage Next Generation Threat Intelligence? Event abstract Learn from forward thinking […]

Page 1 of 1512345...10...Last »