Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Sharing of cyberthreat information requires new technologies and methods to alert organizations of the mischief emanating from cyberspace that threatens their critical IT assets. Michael Daniel heads the not-for-profit Information Security and Analysis Organization of IT security vendors, and will address the Cyber...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
In the wake of the $81 million SWIFT transaction cyberheist from the Bank of Bangladesh - the first in a cascade of SWIFT-related heists - regulators and bankers throughout the world have stopped, taken a step back, and reviewed how interbank transactions and payments are managed and operated. The SWIFT attacks have...
The Department of Homeland Security is at the nexus of the voluntary federal program in which the private sector shares cyber threat information with the government and with other businesses. To encourage participation, Congress last year changed federal law to furnish businesses with liability protections from...
Actionable threat intelligence is the key to effective cyber threat detection and response. But how good is the threat intelligence organizations receive today? And how well are they able to put this intelligence to work to improve their cybersecurity?
Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join...
Fraud Summit - San Francisco 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets....
Fraud Summit - San Francisco 2014 - Could artificial intelligence have been used to prevent the high-profile Target breach? The concept is not so far-fetched. Organizations such as MasterCard and RBS WorldPay have long relied on artificial intelligence to detect fraudulent transaction patterns and prevent card fraud....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.