


Cyber Pearl Harbor – United States Military Preparedness and Lessons Learned For Business
December 7, 2016 marks 75 years since the Japanese surprise attack on Pearl Harbor. Today, by most estimates, as much as 85 percent of US critical infrastructure is owned by the private sector. The government’s senior-most civilian, military, and intelligence...
Hacking the Human – How Social Engineering Owns Our Users
Highly targeted Social Engineering attacks are wreaking havoc in cybersecurity. In one recent incident, hackers used Social Engineering to defraud a US company out of nearly $100 million. The increased use of these techniques is directly related to the fact that they...
Incident Response – Anatomy of a Cybersecurity Breach
Ever wonder what it’s really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn’t be your first. Join our panel of cybersecurity...
RSA Conference 2016 – Seven Key Takeaways You Can Use Today
RSA Conference 2016 broke new ground as the largest gathering of security professionals with +40,000 attendees, +500 exhibitors, and +213,000 square feet of exhibit space. While keynotes, and many speakers addressed global and national issues, these topics often have...
Smackdown: Wrestling with Security and Compliance in the Cloud
Rapidly evolving cloud technologies makes evaluating security and compliance risks a difficult proposition. Cloud service providers and their clients have a shared responsibility for security and compliance; but defining these roles can keep you running in circles. In...
How to Survive the Top Ten Cybersecurity Risks of 2016
2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
Payment Card Industry Security and Compliance Round Table
Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We’ll dive into a...
You’ve been hacked. Now it’s time for “Plan B”
With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...
How the Retail Industry is Shaping the Future of Cybersecurity
An estimated two-thirds of the U.S. gross domestic product comes from the retail industry. This activity has also driven the mass accumulation of payment card data that now serves as a de facto currency. The unfortunate consequence is that criminals can be more...