Cyber Supply-Chain Attacks

Cyber Supply-Chain Attacks

Should we be Afraid of our Third Party Vendors? The biggest threat in cybersecurity might be under our noses. According to a recent Ponemon Institute study, US organizations are failing to assess the risk of attacks and data breaches from vendors in their supply...
Tackling the Top Cybersecurity Threats of 2018

Tackling the Top Cybersecurity Threats of 2018

Industry experts predict the unpredictable and share ideas on threat mitigation 2017 was a terrible year for security managers. Vulnerabilities and exploits blew up, malware infections accelerated, and data breach costs reached well into the billions. So what’s...
You Just Got Pwned – New Threats to Mobile Security

You Just Got Pwned – New Threats to Mobile Security

Mobile devices are now more ubiquitous than PCs. Their popularity and relatively immature security have made them attractive targets for hackers. The number of new vulnerabilities in mobile operating systems and apps continues to grow; as does the number and...
Risks and Rewards – Securing the Internet of Things

Risks and Rewards – Securing the Internet of Things

IoT is transforming industries and creating massive business opportunities. By 2020, the number of IoT connected devices is predicted to exceed 40 billion. From smart televisions to critical infrastructure, our industry needs to protect and manage devices and...
Incident Response – Anatomy of a Cybersecurity Breach

Incident Response – Anatomy of a Cybersecurity Breach

Ever wonder what it’s really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn’t be your first. Join our panel of cybersecurity...
How to Survive the Top Ten Cybersecurity Risks of 2016

How to Survive the Top Ten Cybersecurity Risks of 2016

2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
Payment Card Industry Security and Compliance Round Table

Payment Card Industry Security and Compliance Round Table

Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We’ll dive into a...
You’ve been hacked. Now it’s time for “Plan B”

You’ve been hacked. Now it’s time for “Plan B”

With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...