Cyber Supply-Chain Attacks

Cyber Supply-Chain Attacks

Should we be Afraid of our Third Party Vendors? The biggest threat in cybersecurity might be under our noses. According to a recent Ponemon Institute study, US organizations are failing to assess the risk of attacks and data breaches from vendors in their supply...
Hacking the Human – How Social Engineering Owns Our Users

Hacking the Human – How Social Engineering Owns Our Users

Highly targeted Social Engineering attacks are wreaking havoc in cybersecurity. In one recent incident, hackers used Social Engineering to defraud a US company out of nearly $100 million. The increased use of these techniques is directly related to the fact that they...
Incident Response – Anatomy of a Cybersecurity Breach

Incident Response – Anatomy of a Cybersecurity Breach

Ever wonder what it’s really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn’t be your first. Join our panel of cybersecurity...
How to Survive the Top Ten Cybersecurity Risks of 2016

How to Survive the Top Ten Cybersecurity Risks of 2016

2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
Payment Card Industry Security and Compliance Round Table

Payment Card Industry Security and Compliance Round Table

Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We’ll dive into a...
You’ve been hacked. Now it’s time for “Plan B”

You’ve been hacked. Now it’s time for “Plan B”

With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...
Conquering our Biggest Security Challenges in 2015

Conquering our Biggest Security Challenges in 2015

This webinar features industry cybersecurity experts discussing how they are addressing their biggest security challenges and what’s keeping them up at night. We’ll get practical advice on how they use tools, technologies, and processes to protect their...