Sponsor: RiskIQ

The Digital Risk Management Maturity Model

How mature is your organization's digital risk management program?

For many organizations, multichannel access to information, including web, mobile and social channels, presents new digital threats that are often overlooked. Join senior security analyst Nick Hayes of Forrester Research, co-author of The Forrester Wave™: Digital Risk Monitoring, to discuss digital risk monitoring and management.

Watch this webinar presented by Slashdot Media and sponsored by RiskIQ to learn how to gain visibility into, detect, and respond to digital threats of all kinds. We will discuss:

  • How digital risk threatens your organization
  • The Digital Risk Maturity Model
  • The requisite processes and resources necessary to formalize and fine-tune digital risk management
  • Where to prioritize your investment in digital risk for maximum impact

Watch the webinar and take your first steps towards further reducing digital threats.

About the Presenters:
Nick Hayes is a Senior Analyst at Forrester Research. His research is dedicated to helping risk professionals and other business leaders understand and manage customer-facing risks in order to build more resilient brands. He has extensive knowledge of the security, privacy, archiving, and other compliance challenges of social media, as well as the technical controls used to address them.

Sam Curcuruto is the senior product marketing manager at RiskIQ, where he's responsible for spending time with security professionals to understand their problems and find innovative ways that RiskIQ technology can help solve them. Sam's experience spans tech companies focused on cybersecurity, cyber infrastructure management, and consumer software.

View Now

Using Internet Data Sets to Understand Digital Threats

As businesses adapt to the rapidly changing digital landscape, more customer and business operations are shifting from behind the protection of firewalls to the open internet. This new level of exposure makes your company, customers, and prospects vulnerable to the extremely skilled persistent threats across the web, mobile, social, and email.

Fortunately, Internet data can be sorted, classified, and monitored over time to create highly connected data sets that provide a complete picture of your attackers and their evolving techniques. Security professionals must leverage the relationships between these data sets to surface new connections, group similar attack activity, and substantiate assumptions during incident response.

In this white paper, we’ll explore the technique of infrastructure chaining, and explore the data sets available to security professionals such as:

  • Passive DNS
  • WHOIS
  • SSL Certificates
  • Analytical Trackers
  • Host Sequence Pairs
  • Web Components
  • Open Source Intelligence (OSINT)
Get Whitepaper

Appsession: Is our Appetite for Mobile Apps Putting us at Risk? Infographic

With the explosion of mobile app usage, more personal information than ever is flowing through mobile applications. But has our security awareness kept pace? Have consumers adopted best practice behaviors or are they leaving themselves vulnerable to cyber attack?

Download the infographic for a breakdown of the new mobile safety landscape, including how often:

  • Users tclick on ads promoting apps
  • Users click on links in emails, mobile web, and social media promoting apps
  • Users rarely or never check the app details before downloading
  • Users rarely or never inspect the T&C’s or permissions being requested during app installation
View Now

Appsession: Is our Appetite for Mobile Apps Putting us at Risk?

A RiskIQ Mobile Consumer Report

With so much of our personal information now flowing through mobile applications, has our security awareness kept pace? Have consumers adopted best practice behaviors or are they leaving themselves vulnerable to cyber attack?

To better understand consumer behavior, RiskIQ commissioned Ginger Comms to survey 1,000 US and 1,000 UK consumers aged 16 to 60+, specifically focusing on smartphone apps. The survey was conducted during February and March 2017.

The top line results show that over half of all respondents regularly display behaviors that put themselves at risk. Download the report to find out:

  • The percentage of users that click on ads promoting apps
  • The percentage of users that click on links in emails, mobile web, and social media promoting apps
  • The percentage of users that rarely or never inspect the T&C’s or permissions being requested during app installation
  • The percentage of users that reuse passwords across mobile apps
Get Whitepaper