Co-hosted by the Congressional Cybersecurity Caucus and OTA, please join OTA and industry leaders from Identity Guard, LifeLock, Symantec & Verisign for a briefing on the emerging threat landscape, including breaches, ransomware and business email compromise exploits. Panel will discuss best practices to help prevent these from occurring and how best to respond to an incident.
START With Privacy: will bring together thought leaders in academia, business, government and technology. We will explore in-depth the relationship between privacy and security threats in the digital environment, led by experts in both fields. UW’s Tech Policy Lab is hosting this first-of-its-kind gathering. The conference will also mark the debut of a new tool developed by Washington state: a “Privacy Modeling” application created
Webinar to review highlights of the 2017 Cyber Incident and Breach Readiness Plan. Attend to learn best practices to help protect your data, complete risk assessments and develop an adequate response plan. Download the guide in advance of the webinar at https://otalliance.org/Incident. Speakers to include representatives from Identity Guard, LifeLock, Symantec & Verisign.
RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow. Don’t miss out on this amazing opportunity from February 13 to 17 in San Francisco! OTA members get additional $100 off: 1U7OTAFD
Guest Blog from Pascal Millaire, Symantec
We are entering a new era for global insurers, where business interruption claims are no longer confined to a limited geography, but can simultaneously impact seemingly disconnected insureds globally. This creates new forms of systemic risks that could threaten the solvency of major insurers if they do not understand the silent and affirmative cyber risks inherent in their portfolios.
As a participant of NTIA’s multi-stakeholder vulnerability working group and an attendee to this week’s meeting in DC, I was impressed by the level of collaboration and sharing of best practices. Progress is encouraging.
This summer the email marketing industry suffered a setback due to “list bomb” attacks in which thousands of targeted users were unknowingly subscribed to tens of thousands of mailings. In these attacks, ESP infrastructure and highly-reputed brands were used as a means to effectively create a “denial of service” against user inboxes, and email originating from many ESPs and brands was blocked by Spamhaus until the situation was better understood. Could this have been prevented?