Speaking opportunities: Infosecurity Spring Virtual Conference March 2016

One again, Infosecurity Magazine is running a two-day virtual conference in March.

Each session (bar the keynotes) will have a panel 0f 3-4 speakers. Below are the sessions I’m moderating. If any of the titles interests you or your client, please email me to start off, and I will send more information.

Please note that some sessions are pre-recorded, at at time to be agreed between speakers.

DAY 1

Tuesday, 15 March 11.55-12.45 GMT

The Rise of Ransomware: Prevention & Response to Evade Extortion (LIVE)

In 2015 ransomware was the most common malware infection and the FBI reported that Cryptowall ransomware attacks netted hackers over $18 million dollars from 2014-2015. With ransomware is becoming increasingly sophisticated and potentially lying undetected on your systems, what measures should organizations take to protect themselves from ransomware attacks. And if they fall victim, how should they respond? Join this session to discover how to deal with ransomware within your organization.

  • Understand the different types of ransomware and how they infect your systems
  • Analyze the internal factors that can make your organization more vulnerable to ransomware
  • Identify strategies to protect your organization against ransomware
  • Gain best practice advice on how to detect and respond to ransomware

 

Tuesday, 15 March 13.15-14.05 GMT

Psychology of the Insider: Profiling the Internal Threat Actor (recorded)

A number of recent high-profile data breaches, from the Target breach to the Sony Picture hack, have been attributed to the actions of an insider, whether malicious or accidental. But when it comes to an organisation’s greatest asset, what are the behaviours that indicate an insider threat, and how should information security professionals be monitoring and use that information?

  • Understand the drivers and motivations of the malicious and accidental insider
  • Identify key indicators to identify insider threat behaviour
  • Learn how to monitor behaviours and how to integrate this intelligence into your security strategy
  • Gain key tactics to overcome the insider threat

 

DAY 2

Wednesday, 16 March 12.20-13.10 Eastern time

Integrating Active Cyber Defense into a Security Framework

Traditional security measures have focused on reactive defense, with strategies aimed at securing the perimeter. However, as the cybercriminal becomes increasingly sophisticated and agile, and attacks more targeted, the need for proactive, active defense that focuses on critical assets has never been greater. During this session the panel will discuss effective how to build active defense into your security framework and processes.

  • Identify effective tactics to actively disrupt attackers and protect critical assets
  • Evaluate the key internal function requirements to support an active defense strategy
  • Determine how to use threat intelligence for effective active defense
  • Understand how to get senior management buy-in to active defense

 

Wednesday, 16 March 15.30-16.20 Eastern time

Fostering an Enterprise-Wide Security Culture

As cyber security and resilience move up the board agenda, organisations are realising that for information security to be truly effective, all sectors of the business need to be engaged. But what are the key steps to creating an information security culture within an organisation to ensure that the user is the front line of defence? What approaches can be adopted to motivate the workforce and change the culture? How can organisations encourage a holistic security culture that goes beyond simply raising awareness?

  • Identify key steps for the organisation to take to ensure the user is the first line of defence
  • Understand which strategies can be adopted to motivate the workforce and change the culture
  • Understand how information security can engage a range of stakeholders with different user behaviours and perceptions of risk and privacy
  • Discover how to integrate information security into the wider business to enable seamless ease of implementation and communication
  • Understand the barriers to developing an information security culture and how they can be overcome
Advertisements

About stephenpritchard
Freelance journalist specialising in business and technology, based in London (UK).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: