October Events at Dark Reading You Can't Miss
Cybersecurity Month at Dark Reading is packed with educational webinars, from data breach response to small business security.
Wednesday, Oct. 3, 1 p.m. Eastern: The Real Impact of a Data Security Breach
With Cindi Carter, deputy CISO of Blue Cross Blue Shield of Kansas City, and Joshua Bartolomie, director of research and development for Cofense.
If only a data breach was orderly: neat stacks of breach notification letters, tidy invoices requesting manageable fines, straightforward forensic investigations with no surprises. Breaches are rarely so cooperative, though. In this webinar, learn about the some of the lesser-known impacts major incidents can have both on a business and on its security team, and learn how to better prepare for them. Register now.
Thursday, Oct. 11, 2 p.m. Eastern: Cybersecurity for Small- to Medium-Sized Businesses: 10 Steps for Success
With John Pironti, president of IP Architects LLC, and Perry Carpenter, chief evangelist and strategy officer for KnowBe4.
Small and medium-sized businesses (SMBs) are learning the hard way that they are indeed prime targets for cyber attackers. But many enterprise security tools and practices don't work for SMBs, which have neither the budget nor the skills to operate their own IT security department. In this webinar, learn tips for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for the resource-limited SMB (and maybe even resource-limited large enterprises). Register now.
Wednesday, Oct. 17, 1 p.m. Eastern: Effective Cyber Risk Assessment
With John Pironti, president of IP Architects LLC and Matt Wilson, director of network engineering for Neustar
You might have been told you need to "support the business" and adopt a "risk-based approach" to security, but how do you do that? How do you assess constantly shifting risks in an accurate, data-centric way that relates to your business specifically? In this Dark Reading webinar, get started with the how-to's of risk assessment, including third-party risk and other hidden sources of cyber risk that might not be on your radar. Learn how to identify misspending and direct your security dollars to where they're needed most. Register now.
Tuesday, Oct. 30: The Next-Generation Security Operations Center
With Roselle Safran, president at Rosint Labs & entrepreneur in residence at Lytical Ventures, and Adam Vincent, CEO of ThreatConnect
In the past, the IT security department focused most of its efforts on building and managing a secure "perimeter" and spent most of its time managing passwords and access control lists. Today, however, the security operations center (SOC) has become a place for not only building a strong defense against the latest attacks, but for collecting threat intelligence as well as analyzing and responding to new threats that may evade traditional defenses. In this Dark Reading webinar, learn how to implement the latest threat intelligence technology, tools and practices in SOC operations – and how to prepare your organization for the next major security incident, even if your enterprise doesn't have a SOC in place.
About the Author
You May Also Like
Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024The Unreasonable Effectiveness of Inside Out Attack Surface Management
Dec 4, 2024