This Week On Dark ReadingThis Week On Dark Reading
This week: how to get paid by cyber insurers and avoid paying ransoms.
January 30, 2017
We know every cybersecurity team is overworked and understaffed, but we also know that every team needs all the knowledge and training it can get. So, draw straws with your small squad, decide who will keep both eyes on the incoming alerts, and make sure at least one of you catches some of the educational events coming from Dark Reading soon:
Tuesday, Jan. 31, at 1 p.m. E.T., meet us as we kick off a three-part series, "Preparing For The Ransomware Onslaught." The first installment, presented by independent security consultant Gal Shpantzer, focuses on Ransomware Prevention, and will provide techniques for stopping ransomware in its tracks before it can run rampant through your environment.
Thursday, Feb. 2, at 1 p.m. E.T., in another session from the Dark Reading Cybersecurity Crash Course, David Bradford, chief security strategy officer and director of strategic partnership development for Advisen, will tackle the question "Cyber Insurance: Does It Really Work?" He'll break down some of the questions you should ask yourself, your legal team, and your cyber insurance provider to make sure your policy does what you think it should. (Registration required.)
Tuesday, Feb. 28, beginning at 11:00 a.m., we'll host our next Dark Reading Virtual Event and devote the day to tackling Cybersecurity: Costs, Risks, and Benefits.
Topics will include cyber insurance, measuring risk, measuring the security department's performance, assessing the real costs of a data breach, and managing the everyday costs of an IT security department.
DOWN THE ROAD
Interop ITX is coming to the MGM Grand in Las Vegas May 15-19. The conference program is overflowing with security sessions this year. Plus, the Dark Reading team will be back with the Cybersecurity Summit - a two-day crash course that will bring security teams, from newbies to time-crunched pros, up to speed.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023