The Past, Present and Future of SASE

Data Breach Today

Tips to Improve Your Presentations via Informata

IG Guru

The post Tips to Improve Your Presentations via Informata appeared first on IG GURU. Business Education IG News Informata Jesse Wilkins PresentationsCheck out the article here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Calling all InfoCon Presenters!

IG Guru

Be a part of the action by presenting your skills and best practices to the finest in the RIM/IG profession at ARMA International’s InfoCon 2022. The post Calling all InfoCon Presenters!

Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident

A Practical Guide to Business Intelligence Governance

Speaker: Marius Moscovici, CEO Metric Insights & Mike Smitheman, VP Metric Insights

This presentation will provide a practical step-by-step guide for implementing effective BI governance and a toolkit for addressing the three critical aspects of any program.

i-SIGMA Call For Presentations Now Open

IG Guru

i-SIGMA is looking for topic ideas and presentations for upcoming webinars and next year’s Annual Conference. The post i-SIGMA Call For Presentations Now Open appeared first on IG GURU.

Post-Pandemic Presentation Plans

Dark Reading

Coming to a conference near you -- who knows when

61

e-Records 2022 Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies and universities), local governments, vendors, and subject matter experts from various organizations. TSLAC and DIR are looking for learner-focused presentations that build core skills or share practical knowledge and experience related to the conference theme. Requested Presentation Formats. A presentation must include 1-2 presenters or 3-4 panelists and a moderator.

Google: Hack-for-Hire Groups Present a Potent Threat

Dark Reading

Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of new reports said

80

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

Cybersecurity buyers will want a trusted place online to find, evaluate, and purchase products and services from home, as teleworking replaces more traditional methods of in-person sales presentations, trade shows, events and dinners. There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S.

B2B 186

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022

The Last Watchdog

As we close out 2021, a gargantuan open-source vulnerability has reared its ugly head. Related: The case for ‘SBOM’ This flaw in the Apache Log4J logging library is already being aggressively probed and exploited by threat actors — and it is sure to become a major headache for security teams in 2022. This vulnerability is so dangerous because of its massive scale.

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. Researchers at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, some of them can be exploited for command injection and for gaining access to a device.

Unixfreaxjp at #R2CON2020 presented shellcode basics for radare2

Security Affairs

In this presentation, I explain how to utilize radare2 for variation of shellcode analysis and will lead you as a tutorial from a basic know-how in analyzing shell code with multiple demonstrations.

e-Records 2021: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2021 e-Records Conference has been extended to Wednesday, August 4, 2021. Check out our previous blog post for details about submitting your proposal.

79

A Page From an Information Professional’s Book of Secrets: The Right Time to Deploy Your AI

Speaker: Dick Stark and Casey Steenport

Join our experts for this insightful webinar where members from our team will be available to answer your questions so you can walk away feeling confident in how AI & automation can empower your organization’s service management overall.

Passwordless Is the Future … but What About the Present?

Dark Reading

Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of benefits — and drawbacks — to users

Clear & Present Danger: Data Hoarding Undermines Better Security

Dark Reading

Facebook and Google can identify patterns of attack within their own data, but smaller businesses rarely see enough traffic to successfully identify an attack or warn users

Amazon Alexa Skills Present Security Risks

eSecurity Planet

The post Amazon Alexa Skills Present Security Risks appeared first on eSecurityPlanet. Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices.

Risk 62

Nearly Half of Enterprise Endpoints Present Significant Security Risks

Dark Reading

Risk 61

e-Records 2020 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. This year the annual e-Records conference is online!

What My Optometrist Taught Me About InfoSec Presentations

Dark Reading

A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience

Critical Flaws Found in Eight Wireless Presentation Systems

Threatpost

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws. IoT Vulnerabilities Barco wePresent Crestron critical vulnerability Extron ShareLink wireless presentation system

IoT 63

e-Records 2022: Call for Presentations Extended

The Texas Record

The deadline for submitting a presentation proposal for the 2022 e-Records Conference has been extended to Friday, August 19. Update! Check out this previous blog post for details about submitting your proposal. Keep up to date on all event information at the conference webpage: [link]. Thanks! And we’ll see you in November! News You Can Use

40

MER Conference Call for Presenters – Deadline October 15th, 2022

IG Guru

CALL FOR PRESENTERS Now accepting speaking proposals on topics related tothe Legal, Technical, and Operational components ofInformation Governance. The post MER Conference Call for Presenters – Deadline October 15th, 2022 appeared first on IG GURU. Whether face-to-face or virtual, the MER Conference mission hasn’t changed: Equipping information governance professionalsto more meaningfully impact their organization’s business objectives.

Third-Party Scripts on Websites Present a 'Broad & Open' Attack Vector

Dark Reading

Nearly half of the world's largest websites use externally generated JavaScript that makes them ripe targets for cyberattackers interested in stealing data, skimming credit cards, and executing other malicious actions

84

e-Records 2021: Call for Presentations Final Extension

The Texas Record

Update: The final deadline for submitting a presentation proposal for the 2021 e-Records Conference has been extended to Wednesday, August 11, 2021.

83

Windows 7 End of Life Presents Hacking Risk, FBI Warns

Adam Levin

The post Windows 7 End of Life Presents Hacking Risk, FBI Warns appeared first on Adam Levin. The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk.

Risk 76

e-Records 2021 Call for Presentations

The Texas Record

TSLAC and DIR are looking for learner-focused presentations designed to engage virtual audiences. Prior experience presenting online is not required. We need virtual presenters! Requested Presentation Formats. The deadline for submitting presentation proposals is July 26.

New Malware Tools Pose 'Clear and Present Threat' to ICS Environments

Dark Reading

The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure

81

3 Steps CISOs Can Take to Convey Strategy for Budget Presentations

Dark Reading

Answering these questions will help CISOs define a plan and take the organization in a positive direction

113
113

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

Security Affairs

Britain’s Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees’ details.

Ransomware, Carding, and Initial Access Brokers: Group-IB Presents Report on Trending Crimes

Dark Reading

Report explores cybercrime developments from the second half of 2020 through the first half of 2021

The U.S. Forest Service Presents: Winter Olympics

Unwritten Record

Please Note: Primary source documents used in this post may contain harmful language. See NARA’s Statement on Potentially Harmful Language. Still taken from 16-P-1486, Winter Olympics. Are you in need of some winter sports action during the break between the Olympics and Paralympics? The U.S.

FTC Issues Call for Presentations for PrivacyCon 2021

Hunton Privacy

The Federal Trade Commission issued a call for presentations on consumer privacy and data security research for its sixth annual PrivacyCon , which is to be held on July 27, 2021.

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […]. The post MER 2019 – CALL FOR PRESENTERS appeared first on IG GURU. MER Conference 2019 program is shaping up! Still time to join the speaking team!

FOIA 40

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

At the BLACK HAT EUROPE 2018 held in London the duo presented the tool and confirmed that Toyota plans to share the specifications on Github and will start selling the fully built system in Japan. A research team from Toyota InfoTechnology Center will present “PASTA: Portable Automotive Security Testbed with Adaptability” in a new Briefing at #BlackHat Europe in London, December 3-6 [link].

Paper 75

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

Security Affairs

The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to increase the resilience of Critical Information Infrastructure (CII) sectors. The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to enhance the security and resilience of Singapore’s Critical Information Infrastructure (CII) sectors in delivering essential services.

OPSWAT Presents New Malware Analysis Capabilities for Operational Technology at Black Hat USA 2022

Dark Reading

Product enhancements to offer full IT and OT threat intelligence services for OPSWAT customers

IT 52