This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape. Download whitepaper »
Cybercriminals are adapting to a changing world. And while that’s obvious to the everyone working in security, ESETs Chief Research Officer Juraj Malcho wonders whether we are doing enough to adapt to a rapidly changing threat landscape. Download whitepaper »
Organised criminals are using new tactics to put a new face on old crimes, and with overwhelming success. Better analysis of network data is emerging as a powerful defence helping Australian companies to harness the power of analytics to detect breaches early and minimize their exposure. Download whitepaper »
CSO hosts a breakfast event on cloud security for CSOs and ITS Managers featuring Raimund Genes, CTO, Trend Micro, Raimund Choo, Fulbright Scholar and Inventor, as well as industry moderated roundtables (Commissioner for Privacy and Data, Rob Livingstone Advisory, Serco, GWA Group, and RMSec).
Cyber Security interview with Richard Archdeacon, Head of Security Strategy at HP Enterprise Security Services conducted by David Braue, CSO Australia
Our key industry moderators from each roundtable discussion will come to stage to discuss each table's challenges, considerations and key takeaways in a panel format including Q&A with the audience.
Quality of Security - Defense in Depth
CSO interviews CSO moderators on key takeaways from the CSO CXO Series event sponsored by Trend Micro in Melbourne 31st July 2015. Interview conducted by David Braue, CSO Moderator