Mid-Market in the Crosshairs: Why Cybercriminals Are Targeting Midsize Organizations and How to Foil Them

Event Date: Tuesday, May 15, 2012 at 02:00 PM EDT

While the biggest data breaches and security incidents scream out at us from the daily headlines, the facts are that the overwhelming majority of security incidents, data theft and loss take place in the small and mid-market sector. A recent large data breach of a payment processor involving more than 50,000 accounts started with a parking garage company. In fact the 2012 Verizon Data Breach Report shows that out of 855 breaches reported last year, 570 took place at organizations with between 11 to 100 employees.

Data breach and security incidents are expensive as well. Recent data and reports show that on average a data breach security incident could cost your company well into the hundreds of thousands of dollars.

The data is overwhelming, and it shows that mid-market companies cannot hide in the crowd and expect to remain safe and secure. Don’t let your organization be the next data breach victim. Research shows that 97% of these attacks can be stopped with just some rudimentary security measures in place. You don’t need to spend a fortune to save your business.

Join well known security expert Alan Shimel, managing partner of the CISO Group, and an all-star panel of security experts as they discuss the findings of the 2012 Verizon Data Breach Report and provide you with 12 simple, solid steps you can take right now which will drastically reduce your threat profile.

ABOUT THE SPEAKERS

Alan Shimel

Alan Shimel is a managing partner in The CISO Group, a provider of security, risk and compliance solutions. Prior to founding The CISO Group, Alan was the chief strategy officer at SillSecure, a provider of network infrastructure security solutions. Alan has also held executive positions at Cachier, Interliant and was a founder of TriStar Web. Alan is a sought-after speaker at industry and government conferences and events. He also produces the influential blog and podcast, "Ashimmy, After All These Years." Alan is also a regular contributor to The CISO Group’s Security.exe blog and podcast.

Alex Hutton

Alex Hutton is a Director of Operational Risk Management for a U.S. financial institution where he is responsible for information risk management and vendor management. He previously worked for the Verizon Business RISK Team, which builds and hones the risk models for cybertrust services, produces the Verizon Data Breach Investigation PCI Compliance report and is responsible for the VERIS data collection and analysis efforts.


Mike Murray

Mike Murray has spent more than a decade helping companies protect information by understanding their vulnerability posture from the perspective of an attacker. From his work in the late 90's as a penetration tester and vulnerability researcher to leadership positions at nCircle, Neohapsis, and Liberty Mutual Insurance Group, his focus has been on providing vulnerability assessment through penetration testing and social engineering to proactively defend organizations. Mike is in charge of advanced curriculum at The Hacker Academy and is also a managing partner of MAD Security, LLC, where he helps corporate and government customers understand and protect their security organizations.

 If you have previously registered for this event, please login below:
 Email
 LOGIN


Registration is required to attend this event. Please register now.
Salutation*
First Name*
Last Name*
Business Title*
Company*
Street Address Line 1*
Street Address Line 2
City*
State/Province (N/A if not applicable)*
Postal Code/Zip Code/Country Mail Code*
Country*
Phone Number*
Email*
Which of the following best describes your company or organization (check one)?*
Company or Organization looking for a complete solution, Software, Hardware or Business Consulting Services
Independent Software/ Hardware/ IT Services vendor
Systems Integrator/Independent Consulting firm
IBM or IBM subsidiary
IBM Business Partner
Have no current company affiliation
Unknown
Other
If other please specify
What role do you play in the acquisition of IT or Business Services solutions?*
Decision Maker
Evaluator
Influence or recommend
Implementer
Business sponsor
Purchase Agent
None
Unknown
Other
If you chose other please specify
IBM and its affiliates may use the information you have provided to keep you informed about IBM products, services and offerings
 No, do not send me e-mail.
 No, do not call me.
 No, do not send me postal mail.

By submitting this form I agree that IBM may process my data in the manner indicated above and as described in IBM's Privacy statement.
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 

ON24 Privacy Policy