Monday, October 9th @ 11AM ET
700 Million Responses Can't Be Wrong
Come to this session to gain key insights into end-user cyber security knowledge. We will share the results of our 2017 Beyond the Phish Report, which analyses the aggregate data of 70 million responses to security questions and training challenges across several different topics.

Monday, October 9th  @ 2PM ET
What the Kidnapping &Ransom Economy Teaches Us About Ransomware. 
Ransomware is center stage, as campaigns are practically guaranteed financial gain. Cyber-criminals profit hundreds of millions of dollars by selling our data back to us. If you look closely, the ransomware economic dynamics closely follow the real-world kidnapping and ransom industry. We’ll explore the eerie similarities, where ransomware is headed, and strategies we can bring to the fight.

Tuesday, October 10th @ 11AM ET:
Innovation In the Cognitive Era
Keeping up with the bad guys has never been harder. Attackers continue to improve their tactics with more advanced techniques, new technologies produce new areas of vulnerability and our ability to hire security experts to improve defenses is not keeping pace with the threat. This means we need to find ways to do more with less by leveraging the latest in cognitive computing, automation and new, innovative technologies stay ahead of the threat.

Tuesday, October 10th @ 2PM ET
Today’s Threat Landscape from a Global Prospective
While the full abstract for this webcast is still being constructed; here’s a bit of background about the speaker who’s presenting it.
Our speaker for this webcast has 15 years of security and BCDR/COOP experience, managing security and IT operations around the world – working through business interruptions including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cyber-attacks. He was also a part of the data science team that produces the annual Data Breach Investigations Report.

Wednesday, October 11th @ 2PM ET
The Definition of Hacker Presented By Our Keynote: Charles Tendell
In this webcast we will be killing the myths and explaining why this diverse community and unique way of thinking is what you need & how that definition will impact the future of cyber security. 

 Thursday, October 12th @ 11AM ET 
Title Coming Soon
Our Speaker has been in the information security industry for over a decade. During his career, he has been sought after as a dynamic, and highly educated, speaker on various Infosec subjects. His deep knowledge of information security principles and trends has led to speaking engagements in Silicon Valley, Interop Las Vegas, and all across Canada.
For the past three years he has been focused on helping organizations protect themselves from insider threats against their most rapidly growing data repositories.

Thursday, October 12th @ 2PM ET
6-Month Status Check – NYS – DFS – Cybersecurity Regulations with a strong focus on the Equifax breach If you remember from our previous webinar series; we took a hard look at the regulation that took effect on March 1, 2017.  The New York State Department of Financial Services regulation(first-in-the-nation) aims to protect consumers from the ever-growing threat of cyber-attacks.  In this presentation, we will discuss requirements of the regulation, the deadlines that have passed, the deadlines that are looming, and what is needed to become compliant. We all also use the Equifax breach as a case study for a real-world application of this regulation.


iSECURE is hosting another informational webinar series to keep you current on the latest cyber threats and security breaches, as well as effective strategies and tools available to protect from them.

You have the option to sign up for as many webinars as you'd like during the week, earning you (1) CPE credit hour for each presentation you attend. This time around we're switching things up a bit! Instead of SWAG packs, we will choose 5 lucky winners to be entered into a $100.00 Amazon gift card giveaway. 

The Future Of Cyber Security Webinar Series

Registration Policies
A valid work email is required to confirm your registration and to provide event news and updates. Please note that registration for
this event does allow release of your contact information to the listed event sponsor(s) .

Qualification Policy
By registering for this event, you are confirming that you are 18 years of age or older. This event is open to Information Security professionals only, and proof of industry involvement may be required. This event is not open to other Information Security vendors, resellers, and manufacturers. iSECURE reserves the right to cancel any registrations.

Please complete the form to register.