DARKReading: How Applications Are Attacked: A Year in Application Security (April 4th)
IT - CxO Security Events

DARKReading: The Importance of Bespoke Security (March 14th)
Tuesday, March 14th, 2023: 1:00 PM to 2:00 PM EST
In this webinar, you will hear from our subject matter experts, Hanah Darley, Head of Threat Research and Toby Lewis, Global Head of Threat Analysis. The discussion will cover the difference between media coverage of cyber threats compared with the most realistic threats to businesses. They will also be focusing on cyber risk, defense in depth, and the importance of bespoke security to counter relevant threats to organizations.

During this webinar you will:

  • Learn how Darktrace works under the hood, and why that matters.
  • Gain a realistic perspective on the threats facing your organization.
  • Understand the importance of bespoke security and defense in depth to combat the evolving cyber threat landscape.

Presented live by featured speakers Toby Lewis and Hanah-Marie Darley. Moderated by Peter Krass.

Hosted by DARKReading


This webinar will discuss how security and privacy teams can leverage a Privacy Code Scanning approach to identify when sensitive data is collected, shared, stored, and even leaked, enabling teams to see the issues within their organization's infrastructure and address them.

A raft of privacy-protecting regulations across the world, from GDPR in the EU to CCPA in California, oblige organizations in the private and public sectors to take the personal data of customers, employees, students, patients, and citizens seriously.

Key Topics for Discussion

  • The shortcomings of the previous manual approach to listing all the privacy data within an organization (resource-intensive, point-in-time view only, etc.).

  • The comprehensive and continuous nature of the Privado approach.

  • The value of the open-source scanner available from Privado and what's possible with the Enterprise version.

  • What is on Privado's roadmap in terms of additional functionality.

  • Answers to audience questions during Q&A.

Hosted by blackhat


A full-day virtual event exploring the latest technologies that can help strengthen your cybersecurity defenses, and the best path for deploying them. You'll hear about state-of-the-art techniques for stopping ransomware in its tracks. You'll learn how to secure your critical data from threats in the cloud.

Ransomware, cyber extortion, zero-day exploits, cloud threats, and supply chain attacks: a seemingly nonstop barrage of new exploits and attack campaigns emerge each day, leaving enterprises wondering if their existing security defenses can thwart the latest - and increasingly sophisticated - threats.

In Q1 2023, Dark Reading will hold a full-day virtual event designed to update your team on some of the most promising emerging cybersecurity technologies and how you can adopt and deploy them in your enterprise.

This event, Emerging Cybersecurity Technologies: What You Need to Know is a free, one-day online conference produced by the editors of Dark Reading, that offers an in-depth look at the latest security technologies and services.

Hosted by DARKReading


InformationWeek: How to Grow From DevOps to DevSecOps (March 23rd)
Thursday, March 23rd, 2023: 11:00 AM to 5:15 PM
Some dev and security teams just can't get along. Others might have good intentions, but don't have the right operations, people, processes or technology to help make a DevSecOps team really sing. Attend this webinar and make your DevSecOps team harmonious.

DevOps & DevSecOps share goals of addressing cloud vulnerability, however where they differ is the prioritization of efficiency versus security. In this webinar, learn how DevSecOps builds on the framework of DevOps by adding security integration at every step of the process.

In this webinar, you'll learn the following:

  • Best practices for achieving differing goals of Dev/DevSecOps.
  • How automation and active monitoring drive DevSecOps.
  • How this union impacts ROI.
  • What to avoid when transitioning.
  • Why the integration of security practices will impact the decision.

Hosted by InformationWeek


When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information?

How good are our backups? What does our insurance provider say? How well the organization weathers the attack will depend on how well the organization prepared the answers in advance. In this webinar, learn what processes and procedures should go into your ransomware response playbook, and learn about the tools and techniques that will help you bounce back from a ransomware infection.

Hosted by DARKReading


Angelbeat: Healthcare & Life Sciences (March 29th)
Wednesday, March 29th, 2023: 1:00 PM to 4:00 PM EST
Technology Solutions for Healthcare and Life Sciences is the focus of the Wednesday, March 29, Webinar.

Virtual

The program starts at 1 PM ET, 10 AM PT. Two (2) CPE credit hours are provided.

There is a $500 gift card raffle at the end, given to one individual who attends the entire program.

  • 1 PM ET, 10 AM PT, Ron Gerber, CEO Angelbeat
  • 1:05 Talon Miller, Senior Technical Product Marketing Manager, Redis
  • 1:45 Jesse Eterovich, Vice President of Technology, US Acute Care Solutions
  • 2:05 Vaibhav Shah, Senior Solutions Architect, AWS
  • 2:25 Eric Schoepfle, Data Specialist, Satori
  • 2:45 Srinivasa Shaik, Enterprise Solutions Architect, AWS
  • 3:05 Advait Sawant, Solution Architect, Outsystems

Hosted by Ron Gerber, CEO Angelbeat


This virtual event digs deep into cloud security strategies and tactics at every level, from cloud native architectures and zero trust security through remote workforce weak points. Arm yourself with tips you can use today and to reinforce your fortress for when - not if - the next big breach strikes in your cloud.

Organizations need to be able to harness the power and the agility cloud services afford, but securing those payloads is mission critical. You can't afford a weak link - literally, as ransoms continue to grow. High-profile breaches impact the intellectual property and stock prices of major corporations every day.

AGENDA

  • 11:00 AM - Best Practices for Cloud Security
  • 12:15 PM - Remote Workforce Endemic Era: Building Security into The New Daily Reality
  • 1:20 PM - Getting a Head Start in the Race Against Ransomware
  • 2:45 PM - Working with External Teams to Optimize Security

Hosted by ITProToday


A recent survey by ESG and ISSA showed 65% of security professionals cite operational efficiencies realized by security and IT teams as the most common reason for vendor consolidation. Join this webinar to take a look at the trends that are driving solutions in the networking space

The convergence of security across both wide area and local area networking enables IT professionals to reduce risk while simplifying their day-to-day operations. The added benefit is that it also allows these teams to be more proactive and less reactive.

Join this webinar to take a look at the trends that are driving solutions in the networking space, including:

  • Built-in intelligence for streamlined management and visibility.
  • Outrageous licensing and add-on costs.
  • Fast growth & expansion of branches or satellite sites.
  • Maintaining the same security across on-site and remote users.

Hosted by NETWORKComputing


InformationWeek: Cloud Security: How the Game is Changing in 2023 (March 30th)
Thursday, March 30th, 2023: 11:00 AM to 12:00 PM EST
This virtual event digs deep into cloud security strategies and tactics at every level, from cloud-native architectures and zero trust security through remote workforce weak points. Arm yourself with tips you can use today and to reinforce your fortress for when - not if - the next big breach strikes in your cloud.

Organizations need to be able to harness the power and agility cloud services afford, but securing those payloads is mission-critical. You can't afford a weak link - literally, as ransoms continue to grow. High-profile breaches impact the intellectual property and stock prices of major corporations every day.

Topics Include:

  • Securing Your Remote Workforce
  • Best Practices for 2023 Cloud Security Maintenance and Implementation

Hosted by InformationWeek


In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization.

Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities that have been discovered/disclosed?

During this webinar you will:

  • Find out where vulnerabilities might be hidden inside your systems.
  • Get the latest intelligence on the most impactful vulnerabilities.
  • Hear from experts about how to manage emerging vulnerabilities inside the organization.

Presented live by featured speakers Jonathan Care & Immanuel Chavoya. Moderated by Becky Bracken.

Hosted by DARKReading

See all Archived IT - CxO Security Events articles See all articles from this issue