This Week On Dark ReadingThis Week On Dark Reading
This week: how to get paid by cyber insurers and avoid paying ransoms.
January 30, 2017

We know every cybersecurity team is overworked and understaffed, but we also know that every team needs all the knowledge and training it can get. So, draw straws with your small squad, decide who will keep both eyes on the incoming alerts, and make sure at least one of you catches some of the educational events coming from Dark Reading soon:
THIS WEEK
Tuesday, Jan. 31, at 1 p.m. E.T., meet us as we kick off a three-part series, "Preparing For The Ransomware Onslaught." The first installment, presented by independent security consultant Gal Shpantzer, focuses on Ransomware Prevention, and will provide techniques for stopping ransomware in its tracks before it can run rampant through your environment.
Thursday, Feb. 2, at 1 p.m. E.T., in another session from the Dark Reading Cybersecurity Crash Course, David Bradford, chief security strategy officer and director of strategic partnership development for Advisen, will tackle the question "Cyber Insurance: Does It Really Work?" He'll break down some of the questions you should ask yourself, your legal team, and your cyber insurance provider to make sure your policy does what you think it should. (Registration required.)
COMING SOON
Tuesday, Feb. 28, beginning at 11:00 a.m., we'll host our next Dark Reading Virtual Event and devote the day to tackling Cybersecurity: Costs, Risks, and Benefits.
Topics will include cyber insurance, measuring risk, measuring the security department's performance, assessing the real costs of a data breach, and managing the everyday costs of an IT security department.
DOWN THE ROAD
More on Security
Live at Interop ITX
Interop ITX is coming to the MGM Grand in Las Vegas May 15-19. The conference program is overflowing with security sessions this year. Plus, the Dark Reading team will be back with the Cybersecurity Summit - a two-day crash course that will bring security teams, from newbies to time-crunched pros, up to speed.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023