Speaking opportunities: Infosecurity Magazine webinars, July 2015
May 26, 2015 Leave a comment
We are looking for speakers for the following webinars, for Infosecurity Magazine.
These sessions are educational and widely attended by security professionals. We welcome speakers from analyst houses, independent consultants, academia and security professional bodies (not, sadly, speakers working for IT security vendors).
Please contact me if you are interested in taking part.
2 JUL 2015, 15:00 BST, 10:00 EDT
Protecting Data Across Cloud Applications: the Hidden Challenge
The rise of cloud applications in the workplace is driving the need for companies to extend existing security policies to all devices and manage access to cloud applications.
At the same time, more employees are using personally-owned devices to access, process and store corporate data.
And the ease of deploying cloud applications has increased the incidence of employees using unauthorised applications to process corporate data.
This webinar will discuss:
9 JUL 2015, 15:00 BST, 10:00 EDT
How Outsiders Become Insiders: Understanding and Combating Today’s Threats
Today’s attackers employ a variety of deception tactics allowing them to impersonate legitimate users and bypass existing IT security defences.
Web applications are often compromised in order to host malware or be turned into a phishing site. Users who visit these sites then become infected or have their credentials stolen, giving attackers access to your network. Once inside, attackers become insiders. They use stealthy techniques to move around the network, looking for targets, while remaining undetected for months.
In this webinar we will examine: