Call for speakers: Infosecurity webinars, June 2016

I’m moderating two webinars for Infosecurity Magazine in June.

The topics and timings are below, and I have two guest spaces on each session.

As ever our preference for speakers is:

  • CIOs or IT directors
  • CISOs or heads of security
  • Academic researchers
  • Industry analysts
  • IT consultants specialising in security
  • Professional/trade/accreditation bodies

Unfortunately we can’t take speakers from vendors whose main or sole business is IT security.

The deadline to submit speaker suggestions is 1700 BST, Tuesday 24 May.

 

The Death of Passwords: The Future State of Identity

16 JUN 2016, 15:00 BST, 10:00 EDT

Logging in with a username and password is going to be a very different experience in the future, particularly for the enterprise, consumers, e-commerce and more. Compromised identities, including passwords, are now the number one way cybercriminals are accessing and breaching organisations, over the use of malware.

In this webinar, learn from industry experts and look at the future of identity and the importance of secure credentials including:

  • Identity as a Service (IDaaS): When will you be logging into your corporate network using your Facebook credentials?
  • Is the future biometric?
  • Identity assurance across cloud, mobile, web, social and legacy applications
  • Contextual authentication, or logging users in based on risk factors around geolocation, device or other characteristics
  • Strategies for your organization to align to the future of authentication

 

Shutting the Door on the Attacker

30 JUN 2016, 15:00 BST, 10:00 EDT

There’s no such thing as infallible security, and preventing every single security breach is impossible.

But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team’s first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.

In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including:

  • Why acting too quickly might cause more disruption
  • Key points to consider when choosing an expulsion approach
  • Critical areas to focus on when expelling attackers from the network ends
Advertisements

About stephenpritchard
Freelance journalist specialising in business and technology, based in London (UK).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: