cyber risk

Results 76 - 100 of 186Sort Results By: Published Date | Title | Company Name
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.
Tags : 
palo alto, pwc, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: IBM     Published Date: Jan 11, 2017
Download this eBook to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats - Why Cyber Threat Analysis is the most effective defensive strategy - How analysts benefit from the use of sophisticated data visualization to identify hidden threat relationships and patterns - Why shifting from attack prevention to mitigation is a more practical goal for commercial organizations
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Fiserv     Published Date: Mar 02, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations. In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: • Global payment initiatives • Open Banking standards • Artificial intelligence and machine learning • Consumer demand for real-time fraud prevention and detection
Tags : 
cyber crime, financial crime, financial security, customer experience, financial crime risk management, global payments, open banking standards, artificial intelligence, machine learning, fraud prevention, fraud detection
    
Fiserv
Published By: Forcepoint     Published Date: Dec 27, 2018
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.
Tags : 
    
Forcepoint
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
    
Group M_IBM Q418
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Qualys     Published Date: Jun 02, 2015
Health care is often considered a lucrative business for those involved in waste, fraud and abuse. Today’s ever-accelerating technology changes make data related to health care, medical and financial issues even more attractive (and profitable) to cybercriminals who sell medical identities and siphon money from stolen financial records. Risks are exponentially increased because of organizations’ reliance on electronic systems for mission-critical functions. According to 61% of respondents to the SANS 2014 State of Cybersecurity in Health Care Organizations survey, medical/health record systems are considered the most at-risk information asset among the 224 health care-related organizations represented in the survey.
Tags : 
health care, state of cyber security, increase risks, improved practices, sans
    
Qualys
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
    
Oracle
Published By: Workday     Published Date: Feb 01, 2019
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Forcepoint     Published Date: Jan 03, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.