The Past, Present and Future of SASE

Data Breach Today

Tips to Improve Your Presentations via Informata

IG Guru

The post Tips to Improve Your Presentations via Informata appeared first on IG GURU. Business Education IG News Informata Jesse Wilkins PresentationsCheck out the article here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Calling all InfoCon Presenters!

IG Guru

Be a part of the action by presenting your skills and best practices to the finest in the RIM/IG profession at ARMA International’s InfoCon 2022. The post Calling all InfoCon Presenters!

Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Post-Pandemic Presentation Plans

Dark Reading

Coming to a conference near you -- who knows when

80

Card-Not-Present Fraud Growth: No End in Sight?

Data Breach Today

Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud

Retail 169

Passwordless Is the Future … but What About the Present?

Dark Reading

Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of benefits — and drawbacks — to users

SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022

The Last Watchdog

As we close out 2021, a gargantuan open-source vulnerability has reared its ugly head. Related: The case for ‘SBOM’ This flaw in the Apache Log4J logging library is already being aggressively probed and exploited by threat actors — and it is sure to become a major headache for security teams in 2022. This vulnerability is so dangerous because of its massive scale.

Unixfreaxjp at #R2CON2020 presented shellcode basics for radare2

Security Affairs

In this presentation, I explain how to utilize radare2 for variation of shellcode analysis and will lead you as a tutorial from a basic know-how in analyzing shell code with multiple demonstrations.

A Page From an Information Professional’s Book of Secrets: The Right Time to Deploy Your AI

Speaker: Dick Stark and Casey Steenport

Join our experts for this insightful webinar where members from our team will be available to answer your questions so you can walk away feeling confident in how AI & automation can empower your organization’s service management overall.

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. Researchers at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, some of them can be exploited for command injection and for gaining access to a device.

Clear & Present Danger: Data Hoarding Undermines Better Security

Dark Reading

Facebook and Google can identify patterns of attack within their own data, but smaller businesses rarely see enough traffic to successfully identify an attack or warn users

e-Records 2021: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2021 e-Records Conference has been extended to Wednesday, August 4, 2021. Check out our previous blog post for details about submitting your proposal.

83

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Cybersecurity buyers will want a trusted place online to find, evaluate, and purchase products and services from home, as teleworking replaces more traditional methods of in-person sales presentations, trade shows, events and dinners. There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S.

B2B 174

What My Optometrist Taught Me About InfoSec Presentations

Dark Reading

A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience

New Malware Tools Pose 'Clear and Present Threat' to ICS Environments

Dark Reading

The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure

86

Amazon Alexa Skills Present Security Risks

eSecurity Planet

The post Amazon Alexa Skills Present Security Risks appeared first on eSecurityPlanet. Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices.

Risk 62

e-Records 2021 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. The deadline for submitting presentation proposals is July 26.

Critical Flaws Found in Eight Wireless Presentation Systems

Threatpost

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws. IoT Vulnerabilities Barco wePresent Crestron critical vulnerability Extron ShareLink wireless presentation system

IoT 71

e-Records 2020 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. This year the annual e-Records conference is online!

Ransomware, Carding, and Initial Access Brokers: Group-IB Presents Report on Trending Crimes

Dark Reading

Report explores cybercrime developments from the second half of 2020 through the first half of 2021

Access 104

MER Conference Call for Presenters – Deadline October 15th, 2022

IG Guru

CALL FOR PRESENTERS Now accepting speaking proposals on topics related tothe Legal, Technical, and Operational components ofInformation Governance. The post MER Conference Call for Presenters – Deadline October 15th, 2022 appeared first on IG GURU. Whether face-to-face or virtual, the MER Conference mission hasn’t changed: Equipping information governance professionalsto more meaningfully impact their organization’s business objectives.

e-Records 2021: Call for Presentations Final Extension

The Texas Record

Update: The final deadline for submitting a presentation proposal for the 2021 e-Records Conference has been extended to Wednesday, August 11, 2021.

83

Windows 7 End of Life Presents Hacking Risk, FBI Warns

Adam Levin

The post Windows 7 End of Life Presents Hacking Risk, FBI Warns appeared first on Adam Levin. The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk.

Risk 76

The U.S. Forest Service Presents: Winter Olympics

Unwritten Record

Please Note: Primary source documents used in this post may contain harmful language. See NARA’s Statement on Potentially Harmful Language. Still taken from 16-P-1486, Winter Olympics. Are you in need of some winter sports action during the break between the Olympics and Paralympics? The U.S.

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

Security Affairs

Britain’s Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees’ details.

3 Steps CISOs Can Take to Convey Strategy for Budget Presentations

Dark Reading

Answering these questions will help CISOs define a plan and take the organization in a positive direction

114
114

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

The post MITRE presents ATT&CK for ICS, a knowledge base for ICS appeared first on Security Affairs. MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS).

Risk 79

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

At the BLACK HAT EUROPE 2018 held in London the duo presented the tool and confirmed that Toyota plans to share the specifications on Github and will start selling the fully built system in Japan. A research team from Toyota InfoTechnology Center will present “PASTA: Portable Automotive Security Testbed with Adaptability” in a new Briefing at #BlackHat Europe in London, December 3-6 [link].

Paper 86

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

Security Affairs

The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to increase the resilience of Critical Information Infrastructure (CII) sectors. The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to enhance the security and resilience of Singapore’s Critical Information Infrastructure (CII) sectors in delivering essential services.

Researchers presented an improved version of the WPA KRACK attack

Security Affairs

Now the experts presented a new variant of the attack technique at the Computer and Communications Security (CCS) conference. We believe the main reason vulnerabilities are still present is because the Wi-Fi standard is large, is continually being expanded with new features, and requires domain-specific knowledge to understand,” the researchers conclude. The post Researchers presented an improved version of the WPA KRACK attack appeared first on Security Affairs.

Paper 85

Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks

Dark Reading

Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says

Risk 80

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […]. The post MER 2019 – CALL FOR PRESENTERS appeared first on IG GURU. MER Conference 2019 program is shaping up! Still time to join the speaking team!

FOIA 40

e-Records 2019 Call for Presentations

The Texas Record

We are now accepting presentation proposals from government organizations (state agencies, universities, or local governments), vendors and subject matter experts from various organizations. TSLAC and DIR are looking for learner-focused presentations that build core skills and share practical knowledge and experience related to digital collaboration, communication, security, and retention. Presentations should deliver takeaways that are immediately useful to attendees’ work.

e-Records Conference 2020: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2020 e-Records Conference has been extended to Tuesday, September 15, 2020. Check out our previous blog post for details about submitting your proposal.

72

Past, present, and future of the Dark Web

Security Affairs

Considerations about past, present, and future of the Dark Web. The post Past, present, and future of the Dark Web appeared first on Security Affairs. Which is the difference between the Deep Web and Dark Web? These are intense days for the Dark Web. Operations conducted by law enforcement agencies lad to the arrests of many individuals and the closure of the most popular Black Marketplaces, many of which remained alive over the years.

Using 3-D Secure Transaction Signing to Drive Down Card Not Present (CNP) Fraud

HID Global

Using 3-D Secure Transaction Signing to Drive Down Card Not Present (CNP) Fraud. cwattles. Mon, 01/31/2022 - 09:52

See What Hanzo Is Presenting At  Legalweek(year) Series 2

Hanzo Learning Center

Coming March 16th, don't miss Legalweek(year)'s Keynote, Nina Totenberg , who'll help put into perspective what the latest Supreme Court developments mean for the nation. You'll also want to check out the discussions around legal technology trends and challenges facing corporate legal teams.

52

The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship

Dark Reading

Scholarship's goal is to advance women in cybersecurity, risk, and privacy