June 14, 2021

Online Summit: Cybercrime & Computer Forensics

Last year, the world experienced significant breaches involving the use of botnets, viruses, and other forms of attacks targeting governments and businesses alike.

Engage live with experts at the Cybercrime & Computer Forensics Summit on Feb 3rd to learn what the latest threats to your business are, how to effectively manage breaches, and how to safeguard your organization from cybercriminals all over the world.

Click here to view the full program and sign up to attend your favorite presentations.

WHEN: February 3, 2011, or afterward on demand

Presentations include:

Cyber Security in 2011: What IT Security Managers Need to Know

Natalya Kaspersky, Chairperson of the Board of Directors, Co-Founder of Kaspersky Lab

Enterprise-Wide Risk Management

Ronald S. Ross, Fellow, NIST

Using Logs for Breach Investigations and Incident Response

Dr. Anton Chuvakin, Principal, Security Warrior Consulting

Preventing CyberCrime by Relying on SSL Protocol

Larry Seltzer, Security Analyst

Cybercrime Gets Social

Paul Dwyer, Chief Advisor at International Cyber Threat Task Force (ICTTF)

Cybercrime & Identity

Mike Small, Fellow Analyst at Kuppinger Cole

View the full program and register to view the free webcasts here.

First-ever Online Summit: Your 2011 Survival Guide

As staff, mobile devices and social media make the web increasingly fraught, SC magazine have launched their first-ever online summit on the subject. It features insights from the CSOs of the likes of Canon, Barclays and Euroclear to ensure you don’t fall foul of next year’s web threats, which have got even top governments worried.

SC’s first-ever online summit, streamed to your desk on 8th and 9th December 2010. The full agenda can be found at www.scsummitonline.com.

[ad code=6 align=left]

Some of the topics that will be explored are listed below:

1. Pre-empting 2011’s most devious cybercriminals
2. Hitting on the right social network usage policy to keep the floodgates closed
3. Educating staff as to the inherent dangers of their online activity
4. Controlling the ever-expanding perimeter of Internet-enabled mobile devices

Do take a look at the full program at www.sconlinesummit.com to see if it’s relevant for you and your team. If you have any problems with the link you can visit the sessions directly at www.scwebcasts.tv.

Source:[Information Security Community – Linkedin]