Call for speakers: Infosecurity webinars, June 2016
May 19, 2016 Leave a comment
I’m moderating two webinars for Infosecurity Magazine in June.
The topics and timings are below, and I have two guest spaces on each session.
As ever our preference for speakers is:
- CIOs or IT directors
- CISOs or heads of security
- Academic researchers
- Industry analysts
- IT consultants specialising in security
- Professional/trade/accreditation bodies
Unfortunately we can’t take speakers from vendors whose main or sole business is IT security.
The deadline to submit speaker suggestions is 1700 BST, Tuesday 24 May.
The Death of Passwords: The Future State of Identity
16 JUN 2016, 15:00 BST, 10:00 EDT
Logging in with a username and password is going to be a very different experience in the future, particularly for the enterprise, consumers, e-commerce and more. Compromised identities, including passwords, are now the number one way cybercriminals are accessing and breaching organisations, over the use of malware.
In this webinar, learn from industry experts and look at the future of identity and the importance of secure credentials including:
- Identity as a Service (IDaaS): When will you be logging into your corporate network using your Facebook credentials?
- Is the future biometric?
- Identity assurance across cloud, mobile, web, social and legacy applications
- Contextual authentication, or logging users in based on risk factors around geolocation, device or other characteristics
- Strategies for your organization to align to the future of authentication
Shutting the Door on the Attacker
30 JUN 2016, 15:00 BST, 10:00 EDT
There’s no such thing as infallible security, and preventing every single security breach is impossible.
But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team’s first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.
In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including:
- Why acting too quickly might cause more disruption
- Key points to consider when choosing an expulsion approach
- Critical areas to focus on when expelling attackers from the network ends