The estimated size of the black market for data in India is pegged at around $1 billion by an industry report. So what does this black market look like? How is the data procured, collated, validated and sold? And most importantly, what effect is this pilferage of data having on Indian enterprises?
This session will...
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
Hackers have apparently hijacked potentially thousands of vulnerable MongoDB databases and demanded ransoms for the return of critical data, with some victims paying up, according to security researchers.
Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
For years, Wade Baker was one of the main forces behind the industry's most noted data breach investigations report. Now, as vice president of strategy and analytics at ThreatConnect, he has the chance to practice the lessons he's learned, as he explains in this video interview.
Organizations can apply user behavioral analytics - the practice of reacting to how people behave in the information security realm - to better spot and block data breaches, says Fortscale's Kurt Stammberger.
Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.
This e-Book is produced by Compliance Week in cooperation with ACL and HPE Security - Data Security.
Download this e-Book to learn:
CCOs Play a Stronger Role in Data Privacy
Facebook's Big Data Fail Calls for More Ethics
From ACL: The Big Data Opportunity for Audit, Risk
Management, and Compliance
Advanced security threats are growing every day. And so is the sophistication of cyberattacks, custom malware, drive-by downloads. watering-hole attacks. The list goes on and on. To fight these new threats, organizations are turning to big data security - the process of using data analytics to uncover the hidden...
As the unfolding investigation into the Paris attacks shows, just sharing threat-related data - without adding the crucial context that turns it into actionable intelligence - won't help organizations block attacks.
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discuss the regulatory...
The Telangana government is taking steps to address the state's cybersecurity skills shortage. See its emerging plans to align with academia and industry bodies to build partnerships and new capacities.
In this insightful session, you will learn about two aspects of the Mobile Banking Revolution:
Part I - Don't Just Stop Fraud; Improve Customer Experiences: Consumers demand online and mobile banking -- but the financial institutions are justifiably cautious about putting their customers at risk of fraud. Banks and...