Implementing 100% Zero Trust cybersecurity infrastructure is a daunting task and various factors pose a challenge in the adoption. Transition to a Zero Trust cybersecurity architecture is not a one size fits all approach. This session provides a practical approach to adopting Zero Trust while outlining the strategy,...
In the old days, fraud and cybercrime were distinct in methodology, maturity, motivation and adaptation. Now, the lines are blurred among fraudsters, nation States, hacktivists and more. With moonlighting by cyber government employees, their tools, techniques and practices are thriving in a global black market. Join...
As the dust settles on the immediate impact of Covid-19, many financial services companies are turning their attention to planning for the future. Gigamon has termed this future state as The New Tomorrow and, in this virtual event, Gigamon will discuss the trends that they are seeing emerging from their customer base...
In this talk, we will share the theory and practice of a different approach to application security. Almost every large financial organization is already using software instrumentation for performance (APM) and a handful have already instrumented their applications for security. We'll discuss how their application...
An important step in protecting the data of employees as well as patients is conducting audits of third parties that have access to that data, says Unique Kumar, head of digital innovation and cybersecurity at Max Healthcare, a hospital chain based in New Delhi.
True predictive analysis is difficult - and it sometimes takes years of learning and data modeling to get it right, says Derek Manky, chief of security insights and global threat alliances at Fortiguard Labs.
Using deception technologies can impose a cost on cybercriminals and help reduce dwell times and increase visibility, says Acalvio CEO Ram Varadarajan.
At RSA Conference 2020 in San Francisco, Information Security Media Group's editorial team conducted more than 130 video interviews with industry thought leaders. Here are the highlights.
Innovation, consolidation and integration will be key areas of focus for Symantec's enterprise security business following its acquisition by Broadcom, says CTO Paul Agbabian.
Data segmentation remains one of the big challenges for data governance, says Nirupam Srivastava, vice president for strategy, AI and digital transformation at Hero Corp.
Can quantum cryptography help in containing malware-as-a-service? Kiran Sivakumar, superintendent of police, Central Bureau of Investigation, GoI, says that while there isn't any real case study yet, he is hopeful that the technology will play a future role in combating the menace of this type of cybercrime.
Not knowing where all the data resides in an organization is a major hurdle when it comes to protecting and securing that data, says Prakash Kumar Ranjan, senior manager and lead, IT and information security audit, Airtel Payments Bank.
When it comes to detecting an advanced persistent threat attack, the key to success is not only looking at what anomalies are in the network, but also understanding why certain activities are suspicious, says cybersecurity specialist Mahesh Sogane of the global oil company Shell.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.