The Internet of everything: Impacts on tomorrow’s cyber environment

Participants of the live webcast will be eligible for 1 free CPE credit.

The increasing proliferation of Internet-connected devices is creating significant new opportunities and risks for companies that develop, market, and use them. As the Internet of Things (IoT) continues to expand, how can companies build appropriate security into their connected devices? We’ll discuss:

  • The evolution of threats to connected devices and IoT security, including third-party breaches, social engineering, and intellectual property theft.
  • Implications of and considerations for bringing new connected devices to market, including use of secure-by-design principles.
  • Examples of secure IoT device development, including smart vehicles and connected medical devices.

Participants will explore ways to build security into connected devices rather than bolting it on as an afterthought.

The Future of Cybersecurity in Internal Audit

Participants of the live webinar will be eligible for 1 free CPE credit.

Very few internal audit professionals would argue that the role of internal audit is changing, and change can be considered the hallmark of a profession that is maintaining and enhancing its relevance.

Just as the profession has evolved and adapted to IT’s growing importance, internal audit needs to adapt again to address critical cybersecurity risks. Working with the Institute of Internal Auditors’ Audit Executive Center, in collaboration with the Internal Audit Foundation, Crowe conducted a survey of U.S. internal audit and cybersecurity professionals to ask about the role of internal audit as relates to their organizations’ cybersecurity strategies and initiatives. The responses suggest some conclusions about the potential future role of internal audit in dealing with cybersecurity issues.

Monitoring your attack surface with effective logging capabilities

Participants of the live webcast will be eligible for 1 free CPE credit.

Join Baker Tilly cybersecurity consultants as they share what organizations should expect from a well-designed solution and the key components of an effective IT logging function. Learn how leading enterprises design and implement logging solutions to monitor the IT environment and identify potential cybersecurity events worthy of further investigation. This technology-agnostic presentation will explain how to ensure a complete approach to logging servers as well as endpoints. Additionally, learn how you can utilize logging data to increase the signal-to-noise ratio about important cybersecurity events and better manage your cybersecurity posture.

Key learning objectives

After attending this webinar, participants will be able to:

  1. Identify the cybersecurity benefits a well-designed logging capability provides to the organization
  2. Describe the components of a logging capability
  3. Assess critical considerations that make logging and monitoring more successful