India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches and to have better data protection mechanisms in place. The move could help fast-track cybercriminal investigations. But will data localization lead to improved data security?
This panel discusses:
Whether...
Since May 25, 2018, when GDPR went into full effect, security practitioners have been waiting to see how privacy regulators might impose sanctions for breaches. They're still seeking clarity on various GDPR clauses. For example, is there a resilient data protection framework for GDPR? How can an organization implement...
Enterprises are increasing their security budgets, but they still are struggling with attracting and training the necessary cyber talent. Organizations are addressing the skills gap challenges using industry certifications, product certifications, on-the-job training or by following cybersecurity frameworks. But these...
With digitization in full bloom, organizations' IT infrastructures have mushroomed to another level. As a result of new technologies, including IoT and the cloud, the cyberattack surface has spread far beyond laptops or servers in a data center.
But are security strategies evolving to keep up with the changes? How...
End point detection and response (EDR) implementation can be a time-consuming process that requires specialized skills. But it generates finely detailed technical data about every aspect of an end point, which helps in enhancing security. Although deploying EDR could be impractical for organizations that have small IT...
As cyberattacks become more frequent, security operations teams and CISOs are struggling to keep up with the deluge of security alerts from an increasing arsenal of threat detection technologies. The challenges from an increasingly hostile threat landscape, combined with a lack of people, expertise and budget devoted...
The cybersecurity landscape is morphing at a more rapid pace than ever. Hundreds of sophisticated hacking campaigns and reckless proliferation of sophisticated malware threats over the last few years have left security teams struggling to contain these threats and protect their organizations at a time when the...
The breach prevention used to rely heavily on static, signature-based detection. This is no longer an approach that will keep even simple threats out of your environment. This session will explain how AI, deception and dynamic behavioral analysis can enable organizations to prevent advanced attacks including...
Cognitive and behavioral biometrics can play an important role in the fight against fraud. This session describes various models used for behavior pattern analysis and demonstrate how this may be integrated into a SOC to achieve a proactive posture.
It addresses:
Developing a risk framework with cognitive...
CISOs are constantly working to develop detection, response and recovery capabilities, while prevention tops the wish list. To handle the skyrocketing volume of malware and cyber exploits, many enterprises are building SOCs that provide a central place for detecting, diagnosing and remediating online attacks....
As businesses surge ahead with agile development processes, security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.
DevSecOps enables application security testing in a more automated fashion.
This session reviews:
How security teams can align their incentives...
Email remains a key vector for attacks, with business email compromises, which often involve impersonating a senior executive to request a money transfer, a growing concern.
BEC attacks often are not detected because the transaction appears legitimate. CISOs have searching for better ways to mitigate the...
The recent breach incidents at Union Bank, Cosmos Bank and Punjab National Bank reveal interesting insights about insider fraud and how insiders can evade both deterrent and detection controls.
This sessions offers insights from a CISO on how to detect and prevent insider fraud, as well as how to map insider threat...
Organizations are increasingly looking at advanced IAM policies and controls to reduce insider data breach risks.
CISOs are working toward establishing processes to grant appropriate access to data by creating and managing user accounts and preventing unauthorized access to information.
Organizations have started...
Threat hunting is the latest innovation for security operations centers when it comes to combating advanced security threats.
When resources and security controls deployed for early detection are inadequate, artificial intelligence may be a more effective approach to threat hunting and responses to advanced attacks....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.