A small subset of professional criminal actors is responsible for the bulk of cybercrime-related damage, employing tools and techniques as sophisticated, targeted and insidious as most nation-state actors, says the State of Cybercrime Report 2018.
The 2018 State of Cybersecurity in Small and Medium Size Businesses study, conducted by the Ponemon Institute, sponsored by Keeper Security, revealed that small businesses increasingly face the same cybersecurity risks as larger companies, but only 28 percent rate their ability to mitigate threats, vulnerabilities and attacks as “highly effective.”
Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019.
Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords/PINs across multiple accounts such as email, computer log in, phone passcode, and bank accounts.
ICS Cyber-Security is the conference where industrial control systems users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Read More
ON DEMAND: Research firms forecast that video will produce 15.1 zettabytes of data annually — no other IoT application comes close to this rate of data production. This influx in data, as well as the growing adoption of video analytics and artificial intelligence, propels video to be used in a wide variety of ways. These trends enhance video’s value but also pose challenges, such as threats related to cybersecurity.
ON DEMAND: All networked systems and devices are exposed to cybersecurity threats. Building security systems are no exception to this rule. Many security systems have been afflicted by ransomware and cyber vulnerabilities. Some have been exploited to create bot armies or to provide an easy entry point for cyber criminals looking to attack valuable corporate assets. Neglect of cyber-hygiene is at the root of many of these issues.
This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training. Join this session to tailor your approach to awareness training and have the greatest impact for all of your employees or customers. Read More
From building a Global Security Operations Center and more, learn how three enterprise security teams created and built GSOCs, and how they are using them to mitigate global risks. Learn more about why HR Professionals worry most about active shooters, how would you define security’s role, and more.