Information Security Media Group's Fraud, Security and Risk Management Summit brought together a diverse group of cybersecurity leaders and experts in New York City for a comprehensive day of education and collaboration on payment fraud, identity theft and third-party risk management.
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
IoT, the cloud, advancements in AI, regulatory fines, third-party risk, cyber fraud - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But how about the new demands on cybersecurity leaders? What new skills, tools and strategies are needed to understand, quantify and manage...
As new prevention technologies are deployed, Fraudsters are forced to change their approach, develop new tools, and uncover new ways to monetize their activities. In this way, Fraud Protection has been a perpetual cat-and-mouse game.
We'll see a real story about a phishing attack that could involve each bank's...
National security, cyber incident response, and cyber security risk management experts analyze the current state of fraud within political campaigns. This includes current challenges campaigns are facing and how best to address those challenges. Join experts from the US CyberDome to learn how to ensure free speech...
in this session we'll first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We'll then dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world...
Whether you're a large enterprise that has experienced a headline data breach or a midmarket organization that has just been paralyzed by ransomware, you share points in common. Which law enforcement agency do I call after the incident has been discovered? When do I involve legal counsel? What resources are available...
In this exclusive one-on-one discussion, we will hear from Chris Calvert, Co-Founder and Product VP for Respond Software, to get his insights on:
Is AI falling short?
How do we successfully balance human and machine approaches to security?
How do we get on the right path?
For the Nation to survive and flourish in the 21st century, where hostile actors in cyberspace are assumed and technology will continue to dominate every aspect of our lives, we must develop trustworthy, secure systems that are cyber resilient. Cyber resilient systems are systems that have security measures or...
Cyber threat actors are trans-national, well-funded and highly organized, they are utilizing leading-edge technology to attack merchants and stealing data at a large scale. Join us as we walk you through our research on what happens after the attacks. We will highlight when that stolen payment card data appears on the...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Vishal Salvi of Infosys on the CISO's evolving role. Another influencer, Pavan Duggal, advocate, Supreme Court discusses what steps the Indian government should take to secure privacy....
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.