Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.
As national security and defense threats become more asymmetrical and complex, intelligence organizations and agencies are challenged to respond more efficiently and precisely. With shrinking budgets and limited resources, these agencies need a solution that can help them accelerate the data-to-decision process, so...
This e-Book is produced by Compliance Week in cooperation with ACL and HPE Security - Data Security.
Download this e-Book to learn:
CCOs Play a Stronger Role in Data Privacy
Facebook's Big Data Fail Calls for More Ethics
From ACL: The Big Data Opportunity for Audit, Risk
Management, and Compliance
Auditing in...
As the unfolding investigation into the Paris attacks shows, just sharing threat-related data - without adding the crucial context that turns it into actionable intelligence - won't help organizations block attacks.
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discuss the regulatory...
Information technology drives innovation and has revolutionized the way businesses, governments and individuals work and interact. The ability to harness big data has
opened the door for world-wide collaboration in real time and is no doubt a game changer. Big data has generated an enormous amount of discussion and...
A penny saved is a penny earned, as Benjamin Franklin made familiar in Poor Richard's Almanac in 1737 - and every penny of fraud loss recovered (or better yet, avoided) goes straight to the organization's bottom line.
Present-day examples span the gamut of industries. The losses are in the billions and growing -...
In this insightful session, you will learn about two aspects of the Mobile Banking Revolution:
Part I - Don't Just Stop Fraud; Improve Customer Experiences: Consumers demand online and mobile banking -- but the financial institutions are justifiably cautious about putting their customers at risk of fraud. Banks and...
RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Big data analytics may be new to some healthcare organizations, but there are plenty of lessons to be learned from successful deployments. Rick Gamache of Red Sky Alliance shares some of these key lessons.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
Most organizations have yet to realize the cybersecurity benefits of big data analytics, says Russell Thomas of Zions Bank. He explains steps the pioneering bank is taking to revolutionize its big data operations.
See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge...
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
Malicious activity triggers measurable events at almost every stage of the attack. There are multiple sensory technologies available, but collecting this data from disparate sources can often just result in the creation of a very large pool of unrelated "facts," an impenetrable noise where no signal can be found. But...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.