home.aspx
 
.

Webinars

Transform Time into a Cybersecurity Advantage
TRANSFORM TIME INTO A CYBERSECURITY ADVANTAGE
What determines success in security? Increasingly, the answer is “time.” Today, attackers have a time advantage. They design attacks that deliberately hide from defenses, and spread across your infrastructure in stealth while evading detection. Defenders must identify strategies that all...

2017 - State of Malware
2017 - STATE OF MALWARE
In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who h...

Elasticsearch Cybersecurity Webinar Series: Addressing Security Gaps
ELASTICSEARCH CYBERSECURITY WEBINAR SERIES: ADDRESSING SECURITY GAPS
Search is a powerful solution that helps you identify your weaknesses and proactively minimize risk to your organization. Cybersecurity expert, Kevin Keeney, dives into how to address security gaps. Highlights Include: How open source augments traditional security models. New ways of thinking about ...

Artificial Intelligence in the Cyber Domain
ARTIFICIAL INTELLIGENCE IN THE CYBER DOMAIN
Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense. On April 19, join Michelle Cantos, Strate...

M-Trends 2018 - Understanding Today
M-TRENDS 2018 - UNDERSTANDING TODAY'S CYBER ATTACK TRENDS
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape. During this webinar, Managing Director Chris Nut...

Cyber Essentials webinar
CYBER ESSENTIALS WEBINAR
Cyber Essentials is a cyber security certification scheme that addresses five key security controls and sets out a good baseline of cyber security suitable for all organisations in all sectors. With Cyber Essentials, organisations can focus on core business objectives, drive business efficiency and ...

PandaLabs Reveals the Cybersecurity Trends in Store for 2018 - Panda Security Webinar
PANDALABS REVEALS THE CYBERSECURITY TRENDS IN STORE FOR 2018 - PANDA SECURITY WEBINAR
Today, more malware samples are created in just a few hours than in the entire twentieth century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more precisely designed. Attackers are meticulously studying their victims ...

Why VMware NSX, AirWatch & vSphere will redefine your Approach to Cyber Security
WHY VMWARE NSX, AIRWATCH & VSPHERE WILL REDEFINE YOUR APPROACH TO CYBER SECURITY
Data breaches, cyber-attacks, security lapses and new regulations have made IT security more challenging than ever now that every organization has gone digital. IT teams are struggling with points solutions, as the traditional security approach no longer works. Explore how VMware makes cyber securit...

Integrated Cyber Threat Intelligence, Threat Hunting and Response With IBM i2, QRadar and Resilient
INTEGRATED CYBER THREAT INTELLIGENCE, THREAT HUNTING AND RESPONSE WITH IBM I2, QRADAR AND RESILIENT
With the rise of advanced threats, the SOC is faced with the growing challenge of adversaries skilled at evading detection. In addition, analysts are overwhelmed by the volume and complexity of data, and they often struggle to find the signal in the noise. Discover how IBM i2, QRadar and Resilient p...

Cybersecurity Fundamentals for Everyone
CYBERSECURITY FUNDAMENTALS FOR EVERYONE
Cyber is full of complicated words and alien concepts. In this webinar we will define the concepts and phrases you need to know, and explain how to get started on cyber security. Subscribe to the ITMPI to access over 1000+ hours of on demand, PDU approved webinars: http://www.itmpi.org/subscribe Fre...

Password Management: Getting Down to Business
PASSWORD MANAGEMENT: GETTING DOWN TO BUSINESS
Passwords have become a necessity in today’s world and are relied upon by a variety of different services to ensure safe and secure access. However, users complain about the burden of coming up with complex passwords, and the even bigger challenge of remembering multiple passwords. What’...

2018 Threat Predictions New Devices, New Threats
2018 THREAT PREDICTIONS NEW DEVICES, NEW THREATS
Please join McAfee leading researchers from McAfee Labs and Office of the CTO as they share threat landscape predictions for 2018. We find ourselves in a highly volatile stage of cybersecurity, with new devices, new risks, and new threats appearing every day. In this webcast, Raj Samani, Lynda Grind...

On-Demand Webinar: Breaching the External Network Security Perimeter
ON-DEMAND WEBINAR: BREACHING THE EXTERNAL NETWORK SECURITY PERIMETER
Network security device vendors have done a good job of preventing or minimizing external attacks on enterprise network infrastructure by adding a range of capabilities to their products, such as access control, IPS, VPN, DLP, antivirus, and other threat prevention measures. Now attackers are lookin...

WannaCry Ransomware Attack: Splunk Briefing and Demo
WANNACRY RANSOMWARE ATTACK: SPLUNK BRIEFING AND DEMO
From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects...

CISO Panel: 5 Ways to Combat Modern Security Challenges
CISO PANEL: 5 WAYS TO COMBAT MODERN SECURITY CHALLENGES
Last year saw dramatic shifts in the cybersecurity landscape. The number of data breaches and cyber-attacks is skyrocketing. CISOs and security leaders are struggling to find and invest in the best approaches to combat cybercrime for their organizations. Traditional application security testing meth...

State of Cyber-Security Arms Race: Preparing for what
STATE OF CYBER-SECURITY ARMS RACE: PREPARING FOR WHAT'S COMING IN 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security indust...

The Working Cloud: Tackling the Security Risks
THE WORKING CLOUD: TACKLING THE SECURITY RISKS
Cloud computing offers a credible alternative to traditional IT delivery models.  But there's no doubt about it - entrusting infrastructure and data to a third party will reduce control and introduces new risks that need to be managed.  Rather than being the Department of "NO"...

Cyber Threat Intelligence: Learn How It Can Drive World-Class Security
CYBER THREAT INTELLIGENCE: LEARN HOW IT CAN DRIVE WORLD-CLASS SECURITY
The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business. When it is better utilized, CTI significantly enhances an organization’s ability to anticipate, identify, respond to, and re...

Webcam Panel Threats and Cyber Resilience
WEBCAM PANEL THREATS AND CYBER RESILIENCE
Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks? Join this interactive panel to learn more about: The latest cyber threats. New attack trends. Fighting cyber crim...

Cybersecurity While Traveling
CYBERSECURITY WHILE TRAVELING
Recommendations for cybersecurity while traveling abroad often sound like they were taken directly from the plot of a spy movie: use clean, "throw-away" devices, accounts, and passwords; assume your devices and information will be compromised; pull the batteries out of your devices before ...

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR CHALLENGES FOR THE HEALTHCARE SECTOR AND THE PRACTICAL STEPS TO COMPLIANCE
With growing cyber threats facing the NHS and other healthcare organisations, and the UK government promising patients secure healthcare services, addressing cyber security must be a priority for all organisations handling patient records and sensitive data. To keep pace with the digital landscape a...

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management
2018 IT PRIORITIES: CYBERSECURITY, CLOUD OUTSOURCING & RISK MANAGEMENT
The technology landscape for firms is changing rapidly with new cyber threats cropping up constantly and cloud outsourcing gaining more and more momentum. Join ACG and a panel of experts to gain the insights you’ll need for 2018. Highlights include: CYBER: Which cyber threats really matter, an...

Cyber security in life sciences – Webinar
CYBER SECURITY IN LIFE SCIENCES – WEBINAR
Watch a recording of our webinar held on 7 March 2018, which provides insights into how cyber security can impact life sciences organisations. In this webinar, KPMG Partners Caroline Rivett, Life Sciences Global Cyber Security Leader, and Stan Gallo, Australian leader for Forensic Technology and Cyb...

Addressing The Security Challenges of the Cloud Generation
ADDRESSING THE SECURITY CHALLENGES OF THE CLOUD GENERATION
Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk. Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of Saa...

Cyber Security: Protecting Assets
CYBER SECURITY: PROTECTING ASSETS
With viewers consuming content on an increasing array of devices and platforms and the virtualisation of workflows, the task of protecting assets has never been so complicated and costly. Add to this the fact that the media industry is a high-profile target for hackers and it becomes clear that cybe...

App Ecosystem Explosion: MaaS360 Features New Partners and Endpoint Security Add-Ons
APP ECOSYSTEM EXPLOSION: MAAS360 FEATURES NEW PARTNERS AND ENDPOINT SECURITY ADD-ONS
IBM Security has expanded its partner ecosystem for unified endpoint management (UEM), now delivering a collection of IBM-certified 3rd party apps that integrate with IBM MaaS360 with Watson. This app ecosystem explosion gives IT & security leaders an intuitive framework to discover, download, a...

Cybersecurity for Small and Medium-Sized Enterprises Using the CIS Controls
CYBERSECURITY FOR SMALL AND MEDIUM-SIZED ENTERPRISES USING THE CIS CONTROLS
This webinar seeks to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with a small number of high priority actions based on the CIS Controls. Taking the approach that not every small business owner is an IT wizard or cybersecurity ninja, this guide focuses on ...

National Cybersecurity Awareness Month 2017
NATIONAL CYBERSECURITY AWARENESS MONTH 2017
National Cybersecurity Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join Michael Kaiser, Executive Director of the Nati...

Smart Cities, Cybersecurity, and The Intersection of IoT
SMART CITIES, CYBERSECURITY, AND THE INTERSECTION OF IOT
IoT and smart cities technologies are impacting – and improving – the business of government at all levels. Powering performance by accelerating processes, agencies are growing increasingly reliant on IoT devices and the data they produce. However, the security implications of these emer...

Why the future for women in security is now
WHY THE FUTURE FOR WOMEN IN SECURITY IS NOW
Cybersecurity remains an area where there is a significant shortage of skilled professionals. In particular, women remain sorely underrepresented. As a part of National Women’s History Month and International Women’s Day Celebrations, IBM leaders will discuss trends and challenges in cyb...

The 2018 Security Threat Landscape
THE 2018 SECURITY THREAT LANDSCAPE
How the progression of cultural IT trends and information security impacts your technological security and security team. How your security approach and technologies enables or hinders cyber security threats. How to arm your security teams and technologies to proactively combat cyber attacks Watchin...

How to Prepare for the 2018 Cyber Threats
HOW TO PREPARE FOR THE 2018 CYBER THREATS
Join Patrick Wheeler, Proofpoint’s Director of Threat Intelligence, on Wednesday, January 24th at 10 AM PT for our webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover: Predictions for the 2018 threat landscape. Key actions you can take to prepare your o...

2018 CYBERSECURITY FORCAST
2018 CYBERSECURITY FORCAST
As the year slowly winds down, join us for a review of major information security events in 2017 and a brief look forward at what is to come in 2018. With so much activity in the cybersecurity space, new government regulation, and continued data breach reports; there are many lessons learned and tak...

How to Approach a Cyber Security Review with Your Eyes Wide Open
HOW TO APPROACH A CYBER SECURITY REVIEW WITH YOUR EYES WIDE OPEN
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018....

Building a Strong Information Security Program in 2018
BUILDING A STRONG INFORMATION SECURITY PROGRAM IN 2018
How can you build a strong information security program that ensures the protection of the confidentiality, integrity, and availability of your information assets and supporting infrastructure? How are your governance functions evolving to meet the latest cybersecurity threats? Join this webinar to ...

2018 Trends in Information Security
2018 TRENDS IN INFORMATION SECURITY
In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new cl...

The Keys to Service Provider Network Security
THE KEYS TO SERVICE PROVIDER NETWORK SECURITY
How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations? The answer: Through a comprehensive approach that harnesses that same power – security automation, scalabi...

Architecting Security for the Future: NetOps and SecOps
ARCHITECTING SECURITY FOR THE FUTURE: NETOPS AND SECOPS
Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of ...

Cloud Compliance with New Financial Services Cybersecurity Regulations
CLOUD COMPLIANCE WITH NEW FINANCIAL SERVICES CYBERSECURITY REGULATIONS
The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they dis...

Boost Cyber Security with Human Augmented Machine Learning
BOOST CYBER SECURITY WITH HUMAN AUGMENTED MACHINE LEARNING
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization? In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional i...

Cyber Threat Predictions & Security for 2018
CYBER THREAT PREDICTIONS & SECURITY FOR 2018
With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018. This interactive Q&A panel with security ind...

Secure Development Lessons from Purposely Insecure Applications
SECURE DEVELOPMENT LESSONS FROM PURPOSELY INSECURE APPLICATIONS
Security pros and developers often use insecure apps to teach or demonstrate application vulnerabilities. The main activity is 'hacking' or showing how exploiting a given vulnerability works. WebGoat was (as far as we know) the first purposely insecure app for teaching web application securi...

AI in Cyber Security: Explained
AI IN CYBER SECURITY: EXPLAINED
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI t...

What are the full spectrum of mobile risks in 2018?
WHAT ARE THE FULL SPECTRUM OF MOBILE RISKS IN 2018?
What are the full spectrum of mobile risks in 2018? Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies. With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into...

Managing Application Connectivity in the World of Network Security
MANAGING APPLICATION CONNECTIVITY IN THE WORLD OF NETWORK SECURITY
The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly w...

Network Security Policy Management - Automation for Transformation
NETWORK SECURITY POLICY MANAGEMENT - AUTOMATION FOR TRANSFORMATION
Making security policy changes manually is a slow, laborious process which is fraught with risks; it can take several days—sometimes weeks—to process a single change in a complex enterprise environment. When hundreds of changes are required each month, it can be an impossible task! In th...

Cyber Thursday: The Latest Challenges And Solutions To Cyber Threat
CYBER THURSDAY: THE LATEST CHALLENGES AND SOLUTIONS TO CYBER THREAT
Cyber Thursday is a regular monthly broadcast video which provides an update on the latest development in the field of Cyber Security. Every second Thursday of the month the programme will feature a number of contributors and panellists from both within Palo Alto Networks and third party thought lea...

Making Security Strategy Reality: Winning Strategy through Tactics
MAKING SECURITY STRATEGY REALITY: WINNING STRATEGY THROUGH TACTICS
In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals ...

Building a cyber security architecture to combat today’s threats
BUILDING A CYBER SECURITY ARCHITECTURE TO COMBAT TODAY’S THREATS
The cyberattack surface is growing as organisations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defence approach to security is no longer enough to protect your network. In this webinar, Erik Bartholomy, security architect at LogRh...

5 Mobile App Security MUST-DOs in 2018
5 MOBILE APP SECURITY MUST-DOS IN 2018
To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of ...

Protect your organization from cyber attacks
PROTECT YOUR ORGANIZATION FROM CYBER ATTACKS
Security is everyone’s responsibility. With the threat of cyber attacks on the rise, growing concerns over data breaches and the high cost—both to your company’s reputation and bottom line—of a serious hack, you simply cannot assume everyone uses common sense all the time. Wa...

How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with InfluxData
HOW APORETO SECURES CLOUD-NATIVE ACROSS PUBLIC, PRIVATE, & HYBRID CLOUDS WITH INFLUXDATA
Containerization has increased the pace of innovation and deployment but presents huge challenges around achieving application security as services are spun up, shut down and moved. Consider securing applications components based on their unique identity rather than with IP address ranges. Trireme p...

What GDPR Means for Your Security
WHAT GDPR MEANS FOR YOUR SECURITY
For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the se...

2018 Cyber Security Trends
2018 CYBER SECURITY TRENDS
Following our latest blog post, 7 key cyber trends to know about for 2018, we will host a webinar on Thursday, the 11th of January at 11am where we will delve into these trends in more detail. Sean Rooney, Cyber Risk and Assurance Director will host the 40 minute webinar and will discuss. The threat...

Top Cybersecurity Trends for 2018
TOP CYBERSECURITY TRENDS FOR 2018
Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and its supporting process are increasing in number and sophistication. Traditional IT security leaders have now become digital security leaders as they expand support...

Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
NEXT-GEN DIRECTORY SERVICES: HOW CIAM AND IOT DRIVE SECURITY & PERFORMANCE
The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies as...

Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
CAREER CONVERSATIONS W/ MARY CHANEY - EXPERT IN CYBERSECURITY LAW
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success? Whether you are an experienced professional or just cont...

Cybersecurity for Michigan Manufacturers Webinar
CYBERSECURITY FOR MICHIGAN MANUFACTURERS WEBINAR
Experts from the Michigan Manufacturing Technology Center-West and Brightline Technologies talk about the unique challenges and threats that manufacturers face from cyber attacks. Download this PDF for a 4-Step Cyber Security Program.

Application Security Fundamentals
APPLICATION SECURITY FUNDAMENTALS
Veracode CTO and Co-Founder Chris  Wysopal addresses the fundamentals of application security. The webinar covers some real world examples of vulnerabilities being exploited, how we can reduce the number and severity of vulnerabilities in our applications, and automated software testing techniq...

Eliminate the IOT Security Blind Spot
ELIMINATE THE IOT SECURITY BLIND SPOT
Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses: Where current architecture is falling short, What next-generation architecture should look like, How to address vulnerabilities found in IoT devices/...

Targeted Attacks Illustrated
TARGETED ATTACKS ILLUSTRATED
There’s a multitude of ways in which attackers can get into company networks, and when they’re in, surprisingly many manage to go unnoticed for long periods of time. Why? In the beginning of a targeted attack the advantage is in the attacker’s corner, as defenders have limited ways...

Can Sharing Threat Intel Save Your Data?
CAN SHARING THREAT INTEL SAVE YOUR DATA?
The concept of sharing threat information and indicators of compromise without exposing all of your knowledge and frailties is a constant challenge for the concept of intelligence. This year, however, a flaw in a cloud resulted in a major data breach. Could intelligence sharing have saved the breach...

10 Things to Test Before Buying Your Next-Generation Firewall
10 THINGS TO TEST BEFORE BUYING YOUR NEXT-GENERATION FIREWALL
How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just applicati...

Three Secrets to Becoming a Mobile Security Super Hero
THREE SECRETS TO BECOMING A MOBILE SECURITY SUPER HERO
How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

Data-driven Cybersecurity Defense for Organizations and their Ecosystems
DATA-DRIVEN CYBERSECURITY DEFENSE FOR ORGANIZATIONS AND THEIR ECOSYSTEMS
Many companies rely on staticpoint-in-time security assessments to measure the cybersecurity health of their enterprise and vendor ecosystem. This approach is quickly becoming obsolete in today’s dynamic cyber threat landscape, fraught with increasingly sophisticated adversaries deploying mali...

Counter the Careless Click, Tools to Help You Train Your Users
COUNTER THE CARELESS CLICK, TOOLS TO HELP YOU TRAIN YOUR USERS
Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. Join this 30-minute webinar “Counter the careless click, tools to help you train your users...

Top 5 Cybersecurity Trends for 2018
TOP 5 CYBERSECURITY TRENDS FOR 2018
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends f...

Security and the Changing Value of our Data
SECURITY AND THE CHANGING VALUE OF OUR DATA
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed. Because of this chan...

Top 5 Application Security Risks Threatening Your Business Today
TOP 5 APPLICATION SECURITY RISKS THREATENING YOUR BUSINESS TODAY
A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense. In this webinar, we will share results from our recent primary ...

Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
DATA DRIVEN SECURITY: IMPROVE YOUR SECURITY POSTURE TO DEFEAT YOUR ADVERSARY
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring ...

Top Cybersecurity Priorities for CISOs
TOP CYBERSECURITY PRIORITIES FOR CISOS
Aligning security with business goals remains a challenge for CISOs across industries. In an age of relentless attacks, CISOs need to be proactive, informed and have the resources to launch a resilient cyber defense. Tune in to this interactive panel discussion to learn the key cyber priorities for ...

Addressing the Biggest Problem in Healthcare IT: Protecting Endpoints
ADDRESSING THE BIGGEST PROBLEM IN HEALTHCARE IT: PROTECTING ENDPOINTS
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Endpoint Security: The Final Frontier
ENDPOINT SECURITY: THE FINAL FRONTIER
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Ransomware: The Billion-dollar Innovation Industry
RANSOMWARE: THE BILLION-DOLLAR INNOVATION INDUSTRY
Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.

Bad Rabbit Ransomware: What you need to know to stay safe
BAD RABBIT RANSOMWARE: WHAT YOU NEED TO KNOW TO STAY SAFE
A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been mo...

Emerging DDoS Trends 2017: Empty Threats & Real Attacks
EMERGING DDOS TRENDS 2017: EMPTY THREATS & REAL ATTACKS
This year the cyber-security realm has experienced a few dramatic emerging trends to include a couple of the largest denial-of-service attacks and ransomware outbreaks in history. Follow NSFOCUS as we take a deeper look into these DDoS attacks and some of the processes that now seem to be tied to th...

How to Social Engineer Your Users Into More Secure Behavior
HOW TO SOCIAL ENGINEER YOUR USERS INTO MORE SECURE BEHAVIOR
In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain....

The Software-Defined Datacenter & Security: A Webinar by Bitdefender & VMware
THE SOFTWARE-DEFINED DATACENTER & SECURITY: A WEBINAR BY BITDEFENDER & VMWARE
Software-defined datacenter technologies are a foundational pillar of datacenter transformation to enable digital business and agile IT. In addition to enabling datacenter agility, automation and cost containment, the software-defined datacenter presents new challenges and offers new opportunities a...

Symantec
SYMANTEC'S 2018 CYBERSECURITY PREDICTIONS
In 2018, the Internet of Things (IoT) will take centre stage as botnets, ransomware, and hackers target them with creative techniques such as playing analog sounds to exploit vulnerabilities in these devices. Attackers are also gaining expertise in psychology in decision theory, and may use this kno...

Threat Intelligence 2017: Biggest Breaches and Events
THREAT INTELLIGENCE 2017: BIGGEST BREACHES AND EVENTS
2017 has been another year full of front-page computer security events and incidents. Headlines have bulged with state-sponsored attacks, ransomware, leaks, and a continuing wave of data breaches. In this webcast, Ryan Sommers, threat research manager, and Erika Noerenberg, senior malware analyst, r...

Top 5 Strategies to Prevent Ransomware
TOP 5 STRATEGIES TO PREVENT RANSOMWARE
It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight. In this webinar “Top 5 Strategies to Prevent Ransomware” ...

Understanding your Attack Surface - Research into FT30 organisations
UNDERSTANDING YOUR ATTACK SURFACE - RESEARCH INTO FT30 ORGANISATIONS
Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the ove...

Phishing and Fraud: Latest Trends and Best Practices for Protection
PHISHING AND FRAUD: LATEST TRENDS AND BEST PRACTICES FOR PROTECTION
Join us for this, interactive webinar, where you will learn:What the latest threat trends are that we are seeing in 2017 and going into 2018, Which organizations are most at risk,How you can implement immediate strategies to proactively protect your institution and your customers.

Threat Intelligence-as-a-Service: Fortify Your Security Posture
THREAT INTELLIGENCE-AS-A-SERVICE: FORTIFY YOUR SECURITY POSTURE
Security organizations face numerous challenges, from increasingly large volumes of data and lack of tools and trained staff, to validate intelligence to the inability to operationalize threat intelligence. What’s required is a solution that addresses their business needs at every stage of the...

Keep the Bad Rabbit Ransomware Out of Your IT Garden
KEEP THE BAD RABBIT RANSOMWARE OUT OF YOUR IT GARDEN
On Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. No matter the size of your organization, you could become the target of a Ransomware attack. View this on-demand webinar to learn how you can protect your business from ransomwar...

Malware in SaaS Applications: The Unprotected Exploit
MALWARE IN SAAS APPLICATIONS: THE UNPROTECTED EXPLOIT
SaaS application use is rapidly increasing, with 70% of organizations having at least one application in the cloud(1). At the same time, however, 41% report concerns about the security of cloud solutions(2). In fact, while companies often employ technologies for advanced threats within their organiz...

IT Trends in 2018: Cybersecurity
IT TRENDS IN 2018: CYBERSECURITY
2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and ...

Four Things Every CEO Should Know About Ransomware
FOUR THINGS EVERY CEO SHOULD KNOW ABOUT RANSOMWARE
Ransomware has become a very real threat for most organisations, with attacks like "WannaCry" and "Bad Rabbit" filling news headlines over the last year. In this webinar we look at the key facts every CEO should know about ransomware in order to prepare for a potential attack.

Protecting your Organisation Against the Evolving Threatscape
PROTECTING YOUR ORGANISATION AGAINST THE EVOLVING THREATSCAPE
Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors.

Blazing the Trail: Changes Facing the Cybersecurity Industry
BLAZING THE TRAIL: CHANGES FACING THE CYBERSECURITY INDUSTRY
Join women leading in cybersecurity, Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco, for a lively roundtable discussion on security and data privacy.

Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks
SHRINKING YOUR ATTACK SURFACE: PREVENTING AND CONTAINING MULTI-STAGE WEB ATTACKS
Is your organization better protected than Equifax or Yahoo, as both were compromised using common web application attack vectors? Web application attacks are by far the largest source of breaches. And with historically low spending on web application security, more breaches are expected to come.

The evolution of ransomware and how to protect your organisation
THE EVOLUTION OF RANSOMWARE AND HOW TO PROTECT YOUR ORGANISATION
Ransomware has been a huge talking point over the last year or so with the large scale Wannacry and Petya outbreaks that caused significant damage worldwide. The strains that are now being seen show that cybercriminals are becoming more sophisticated in order to try and bypass security controls in o...

How automated security can deal with insider threats
HOW AUTOMATED SECURITY CAN DEAL WITH INSIDER THREATS
While 74% of organisations feel they are vulnerable to insider attacks, only 42% feel they can deal with them. In fact, it is insiders, hidden in plain sight, who are the real issue for security rather than external threats. But the cloud brings great opportunities to minimize this risk.

The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
THE NEXT LEVEL OF SMARTER ENDPOINT PROTECTION: GOING BEYOND ANTI-VIRUS PRODUCTS
Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses. Attend this webinar as the first step toward a smarter, more adaptive approach ...

Top 2017 Cyberattacks & How to Avoid Them in 2018
TOP 2017 CYBERATTACKS & HOW TO AVOID THEM IN 2018
2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networ...

What attackers know about your mobile apps that you don’t: Banking & FinTech
WHAT ATTACKERS KNOW ABOUT YOUR MOBILE APPS THAT YOU DON’T: BANKING & FINTECH
Our threat research team spends every waking moment reverse-engineering and cracking mobile apps and devices to help organizations reduce mobile risk. During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog will explain the attacker’s point-of-view, what attacker...

Application Security at the Speed of DevOps
APPLICATION SECURITY AT THE SPEED OF DEVOPS
Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer.

Take Action: Improving Cybersecurity in the Health Care Industry
TAKE ACTION: IMPROVING CYBERSECURITY IN THE HEALTH CARE INDUSTRY
In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations.

Teaming Together to Prevent Attacks and Protect Your Data
TEAMING TOGETHER TO PREVENT ATTACKS AND PROTECT YOUR DATA
Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks.

Ransomware: How to strategically Fight it, Without Breaking the Bank
RANSOMWARE: HOW TO STRATEGICALLY FIGHT IT, WITHOUT BREAKING THE BANK
Ransomware presents some unique challenges to organizations, regardless of the size, industry or geography. However, it has very distinct behavior relative to other kinds of malware. It actually tells you that an attack has taken place.

Facing up to Mobile Security Challenges
FACING UP TO MOBILE SECURITY CHALLENGES
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis.

Pulse Wave Attacks: The New DDoS Threat to Your Network
PULSE WAVE ATTACKS: THE NEW DDOS THREAT TO YOUR NETWORK
Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evang...

A Maturity Model for Healthcare Cybersecurity
A MATURITY MODEL FOR HEALTHCARE CYBERSECURITY
Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations ...

Combining threat intelligence and detection to prevent email based attacks
COMBINING THREAT INTELLIGENCE AND DETECTION TO PREVENT EMAIL BASED ATTACKS
Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move acr...

Cybersecurity in the Digital, Mobile & Cloud Era
CYBERSECURITY IN THE DIGITAL, MOBILE & CLOUD ERA
A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges: Identity that transcends every application access across multiple devices.

Cybersecurity Demystified: Building a Practical & Sensible Cybersecurity Program
CYBERSECURITY DEMYSTIFIED: BUILDING A PRACTICAL & SENSIBLE CYBERSECURITY PROGRAM
Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accident...

Predict Ransomware Attacks Using AI
PREDICT RANSOMWARE ATTACKS USING AI
Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction. How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control commu...

Don
DON'T LET RANSOMWARE KEEP YOU UP AT NIGHT
The proliferation of complex and resilient ransomware variants has dominated recent media headlines. This year has heralded the emergence of self-replicating, worm-like, ransomware in the form WannaCry and Petya.

4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service
4 REASONS NEXT-GENERATION ANTIVIRUS SHOULD BE YOUR NEXT MANAGED SERVICE
There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization a...

Our Security, Delivered Your Way: Channel Profitability as an MSSP
OUR SECURITY, DELIVERED YOUR WAY: CHANNEL PROFITABILITY AS AN MSSP
In the first webinar of this informative series, join WatchGuard and The Channel Company as they take an in-depth look at market trends and opportunities for value added resellers (VARs) transitioning to managed security service providers (MSSPs).

Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security
EXTEND CONTENT & MALWARE ANALYSIS BEYOND PROXYSG TO EMAIL & DOUBLE YOUR SECURITY
Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and...

Providing Security and Threat Protection for the Enterprise - Why It Matters
PROVIDING SECURITY AND THREAT PROTECTION FOR THE ENTERPRISE - WHY IT MATTERS
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

Cognitive Security in Action: Watson at Wimbledon
COGNITIVE SECURITY IN ACTION: WATSON AT WIMBLEDON
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operati...

Comprehensive Cyber Security & Incident Response: CISCO + Splunk
COMPREHENSIVE CYBER SECURITY & INCIDENT RESPONSE: CISCO + SPLUNK
The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
HOW HACKERS EXPLOIT YOUR WINDOWS TOOLS, PART 2: THE WMI THREAT
Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security...

Five Mobile Security Challenges Facing Enterprise
FIVE MOBILE SECURITY CHALLENGES FACING ENTERPRISE
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile.

How to Scale Mobile Application Security Testing
HOW TO SCALE MOBILE APPLICATION SECURITY TESTING
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile. Join Sam Bakken as he shares insights into 5...

2017 Trends in IoT Cyber Attacks
2017 TRENDS IN IOT CYBER ATTACKS
There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual pow...

The Second Coming of Ransomware - Insights into New Developments
THE SECOND COMING OF RANSOMWARE - INSIGHTS INTO NEW DEVELOPMENTS
We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money.

An Elegant and Practical Model for Security Practitioners
AN ELEGANT AND PRACTICAL MODEL FOR SECURITY PRACTITIONERS
Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.

How Threat Intelligence Helps You Combat Targeted Malware
HOW THREAT INTELLIGENCE HELPS YOU COMBAT TARGETED MALWARE
As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. There are steps you can take to defend against ...

Better Protect Your Web Apps by Knowing How They Will Be Attacked
BETTER PROTECT YOUR WEB APPS BY KNOWING HOW THEY WILL BE ATTACKED
Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will: gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise, ...

Stop Living in the Past: A New Approach to Application Security
STOP LIVING IN THE PAST: A NEW APPROACH TO APPLICATION SECURITY
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point.

Introducing CDL - The Cybersecurity Data Lake
INTRODUCING CDL - THE CYBERSECURITY DATA LAKE
An introduction to CDL, the world's first managed on-premise and cloud cybersecurity data lake. Developed with Intel and leading data center, cloud and security vendors, CDL is designed to democratize security analytics at scale, unlock the potential of today’s siloed security solutions.

Be Ready or Pay the Price: Defending Against the Next Ransomware Attack
BE READY OR PAY THE PRICE: DEFENDING AGAINST THE NEXT RANSOMWARE ATTACK
Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities.

The Future of Cyber Security - Facts & Predictions
THE FUTURE OF CYBER SECURITY - FACTS & PREDICTIONS
Ransomware, one of today's biggest security threats, has become a massive growth opportunity for our channel. As key stakeholders fear now that their organisation will eventually be hit by a ransomware attack, they are willing to spend more on IT security solutions.

The State of Application Security: Hackers On Steroids
THE STATE OF APPLICATION SECURITY: HACKERS ON STEROIDS
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications. This webinar will detail key insights from the ...

Disrupting Credential-based Attacks
DISRUPTING CREDENTIAL-BASED ATTACKS
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials. In this session, get detai...

Secure Your Business: How to Improve Threat Detection & Response
SECURE YOUR BUSINESS: HOW TO IMPROVE THREAT DETECTION & RESPONSE
Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. So how do you improve your company’s security? How should you prioritize? How can you integrate a...

Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
LEARN HOW THE NIST CYBERSECURITY FRAMEWORK BENEFITS STATE AND LOCAL GOVERNMENTS
The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture. Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and loc...

The Worst Privacy and Security Risks and How To Defend Against Them
THE WORST PRIVACY AND SECURITY RISKS AND HOW TO DEFEND AGAINST THEM
We live in the age of high-profile breaches and cyber attacks. Every organization is a target, especially in the financial, healthcare and government space. With so much at stake in the event of a breach, what are the biggest cybersecurity risks for organizations? How should we defend against them? ...

Trends in Phishing Response Strategies
TRENDS IN PHISHING RESPONSE STRATEGIES
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

The cyber security challenges faced by businesses adopting a BYOD strategy
THE CYBER SECURITY CHALLENGES FACED BY BUSINESSES ADOPTING A BYOD STRATEGY
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

Crisis Management Techniques for Cyber Attacks
CRISIS MANAGEMENT TECHNIQUES FOR CYBER ATTACKS
The discussion focuses specifically on how to prevent and be best prepared for cyber-attacks in a situation of a crisis.Main points covered:What is a crisis and what are its common features? Business Continuity threats: How likely is that a cyber-attack will occur? Statistics: What industries are at...

Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
MALWARE DETECTION - HOW TO SPOT INFECTIONS EARLY WITH ALIENVAULT USM ANYWHERE
Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of...

Advanced Attacker Deception: Taking Action on the New Threat Terrain
ADVANCED ATTACKER DECEPTION: TAKING ACTION ON THE NEW THREAT TERRAIN
As businesses advance their use of emerging technologies, they also create new openings for cyber attackers. The key to protecting your organization from APTs and other sophisticated threats is to detect intrusions as early as possible in the attack cycle. But this is easier said than done. Using va...

Advanced DDoS Attack Protection
ADVANCED DDOS ATTACK PROTECTION
Government Agencies, Enterprises and Service Providers all experience continuous cybersecurity attacks that often begin with Distributed Denial of Service (DDoS) attacks. DDoS attacks are a world-wide phenomenon impacting all industries, are more complex than ever before, and are increasing in size ...

Are You Prepared for Ransomware?
ARE YOU PREPARED FOR RANSOMWARE?
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, ex...

Staying Ahead of Cyber Attacks | Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS | NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
Can the managed detection and response (MDR) framework protect organizations from today’s advanced, sophisticated threats?  In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber secu...

Endpoint Detection and Response is not enough
ENDPOINT DETECTION AND RESPONSE IS NOT ENOUGH
Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on ...

Stop Pulling Your Hair about Cyber Threats
STOP PULLING YOUR HAIR ABOUT CYBER THREATS
You can construct & deconstruct your app environments and integrate security testing tools while assessing vulnerabilities before releasing to production. Getting anxious about cyber attacks? You're not alone: there’s hardly a day passing by without news of a security breach. Keeping a...

Staying Ahead of Cyber Attacks Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber security consultant Parminder Saini and Paladion’s top cyber security expert Jose Varghese decode the MDR framework to help you under...

NotPetya: Ransomware Or a Cyber Attack in Disguise
NOTPETYA: RANSOMWARE OR A CYBER ATTACK IN DISGUISE
The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the w...

Cybersecurity Tips for IT/OT Networks
CYBERSECURITY TIPS FOR IT/OT NETWORKS
With the growing use of converged IT/OT networks, a number of cybersecurity vulnerabilities and challenges have emerged that many operation managers are still learning to deal with. In this webinar, we share the most important known cybersecurity issues with IT/OT networks, and the latest tips and b...

THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
Email-borne ransomware attacks are on the rise. An average of 4,000+ ransomware incidents have occurred daily since the start of 2016*. What should you do if your organization is hit by ransomware? The key is to have a plan before it happens because the bad guys won’t give you much time to rea...

Locky, WannaCry, now Petya/NotPetya. Is this the new normal in Cyber Security?
LOCKY, WANNACRY, NOW PETYA/NOTPETYA. IS THIS THE NEW NORMAL IN CYBER SECURITY?
What we see is that the cyber arms race continues to evolve. If I were to boil this down to its essence, cyber criminals are combining exploits and attacks in creative ways that are not necessarily brand new, but can be tweaked and combined in new ways to create very effective attacks. Like mixing c...

DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
Motivated hackers will find multiple attack vectors in order to access sensitive data—the crown jewels. A comprehensive preventive strategy is key to slowing down and mitigating damage that might be done by the intruder. While most of these impacted companies were utilizing the latest network ...

After WannaCry: Getting Ahead of Ransomware
AFTER WANNACRY: GETTING AHEAD OF RANSOMWARE
WannaCry is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally. It is imperative for organizations of all types to be prepared to quickly address the growing threats of ransomware. Join Tim Bandos, our Senior Director of...

The Impact of Ransomware & How to Defend Against It
THE IMPACT OF RANSOMWARE & HOW TO DEFEND AGAINST IT
Ransomware attacks have been an ongoing concern since they first emerged as a threat in the mid-2000s and this method of extortion has continued to wreak havoc on individuals and businesses alike across the globe.  Last year saw a prolific increase in the number of new ransomware families and 2...

WannaCry Ransomware Attack: What to Do Now
WANNACRY RANSOMWARE ATTACK: WHAT TO DO NOW
Find out what you need to know and how to protect your organization against the WannaCry ransomware attack, the largest coordinated cyber attack of its kind. WannaCry has already crippled critical infrastructure, multiple hospitals and telecommunications organizations, infecting hundreds of thousand...

Orchestrate Your Security Defenses with Threat Intelligence
ORCHESTRATE YOUR SECURITY DEFENSES WITH THREAT INTELLIGENCE
Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it’s difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to ide...

Insiders and Smart Attackers: How to Track & Stop the Rogue
INSIDERS AND SMART ATTACKERS: HOW TO TRACK & STOP THE ROGUE
Despite some of the most noted ‘leakers’ now having served their punishments, the insider threat still looms large over industry as the hardest to detect with the potential to cause the most damage, providing a dire consequence for a company to find itself in. Whether it is an insider go...

A Look at the WannaCry Aftermath and Ways to Prevent Recurrences with IBM MaaS360 with Watson
A LOOK AT THE WANNACRY AFTERMATH AND WAYS TO PREVENT RECURRENCES WITH IBM MAAS360 WITH WATSON
The WannaCry ransomware attack has come – but not yet gone – as organizations continue to struggle with its destructive fallout across 150 countries and over 200,000 endpoints. A hard lesson learned: this massive threat was wholly preventable. Moving forward, enterprises need the right h...

Battling Unknown Malware With Machine Learning
BATTLING UNKNOWN MALWARE WITH MACHINE LEARNING
CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addit...

Security at Speed: Integrating AppSec into the Tools you Already Use
SECURITY AT SPEED: INTEGRATING APPSEC INTO THE TOOLS YOU ALREADY USE
Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community. Join us for a webinar a...

Cyberattacks: Why Mid-Market Companies Believe They
CYBERATTACKS: WHY MID-MARKET COMPANIES BELIEVE THEY'RE SAFE - BUT AREN'T
A recent Arctic Wolf study found a prevalent cybersecurity dissonance between perception and reality, in which most companies believe that they are more cybersecure than they actually are. This is especially dangerous for mid-market companies, which face the same cyberthreats and issues but with few...

Ransomware from a Hacker’s Perspective
RANSOMWARE FROM A HACKER’S PERSPECTIVE

As last weeks global Wannacrypt cyber attack has shown, Ransomware has indeed matured and its impact on business has grown exponentially.  In the last week alone hackers encrypted hundreds of thousands of files across hundreds of countries globally, incapacitating users and taking whole...

Stop Attackers from Phishing Your Inbox for Good
STOP ATTACKERS FROM PHISHING YOUR INBOX FOR GOOD
Inbound email is the primary source of phishing attacks that lead to breaches like ransomware, BEC attacks, malware and credential harvesting. Area 1 Security locks down your email to keep your organization safe from hacks where current secure email gateways and anti-spam filters fail. This webinar ...

Dealing with Skills Gap in Cyber Security
DEALING WITH SKILLS GAP IN CYBER SECURITY
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Buildin...

WannaCry: Inside the Next Generation of Malware Attacks
WANNACRY: INSIDE THE NEXT GENERATION OF MALWARE ATTACKS
In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future NSA-inspired outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them. We will in...

Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
ANATOMY OF THE ATTACKS: WANNACRY RANSOMWARE & GOOGLE OAUTH PHISHING
On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the info...

Lessons Learned From the Hack of the DNC and Other Incidents
LESSONS LEARNED FROM THE HACK OF THE DNC AND OTHER INCIDENTS
The cause and consequence of several pivotal hacking incidents. What attack tradecraft and techniques will trickle down to the consumer attack community. What you can do to prevent incidents from causing major disruptions in your organization. As we have often heard, "Those who cannot remember ...

Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
ENHANCING YOUR SECURITY INFRASTRUCTURE WITH INFOBLOX THREAT INTELLIGENCE
If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that ...

Prepare for the Imminent Shifts in Endpoint Attacks
PREPARE FOR THE IMMINENT SHIFTS IN ENDPOINT ATTACKS
Ransomware is the latest tool being utilized by cybercriminals to monetize everyday security flaws, and it's causing huge headaches for organizations everywhere. However, the techniques leveraged by ransomware can be tackled – and the probability of an infection dramatically reduced &ndash...

Latest Malware Trends & Attack Vectors
LATEST MALWARE TRENDS & ATTACK VECTORS
In this webinar, Richard Cassidy, Technical Director EMEA, and (ISC)² EMEA Managing Director, Adrian Davis will discuss the latest malware trends and attack vectors. The most reported cyber-criminal groups, the latest attack trends (like WannaCry), and best practices for fighting the adversary ...

DDoS: how to counter the new threats we
DDOS: HOW TO COUNTER THE NEW THREATS WE'RE SEEING IN 2017
The largest Distributed Denial of Service (DDoS) attack doubled in size over the last year. They’re now bigger, more complex, and require more expertise and tools to defend against than in the past. What action do you need to make it harder for an attacker to render your network unresponsive?&...

Improving Cybersecurity Posture While Staying on Budget
IMPROVING CYBERSECURITY POSTURE WHILE STAYING ON BUDGET
Nuspire's Shannon Culp and Dan Hoban discuss planning and prioritizing security projects, staying on top of the ever-changing threat landscape, and staying on track with your budget while doing so.

Don
DON'T CRY OVER WANNACRY RANSOMWARE
Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.Join us to learn what Symantec customers and non-customers can do against this threat and future threats ...

Trends Behind Today
TRENDS BEHIND TODAY'S BREACHES & CYBER ATTACKS IN EMEA
Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks. Register today and get insights into: New phishing trends breaching today’s companies. Changes in modern at...

A Guide to Predicting Cyber Attacks
A GUIDE TO PREDICTING CYBER ATTACKS
The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from t...

From Targeted to Distributed - Raise your Defenses Against Ransomware and Modern Malware
FROM TARGETED TO DISTRIBUTED - RAISE YOUR DEFENSES AGAINST RANSOMWARE AND MODERN MALWARE
Modern malware has evolved and mutated to be hard to detect, defend and protect against. Now to be sure that you are protected from the most common threat you need the best level of security, and is endpoint security like anti-malware really keeping up?While statistics show that worms such as Confic...

Bigger Isn
BIGGER ISN'T ALWAYS BETTER: ASSESSING CYBER RISK TO REDUCE YOUR ATTACK SURFACE
Ransomware, spear phishing and third party breaches have become a huge problem as organizations become more connected online and expand their cyber footprint. When even the largest and most sophisticated global organizations, government agencies, and multinational banks are routinely penetrated and ...

What Every CIO Needs to Know About Technology Risk and Cybersecurity
WHAT EVERY CIO NEEDS TO KNOW ABOUT TECHNOLOGY RISK AND CYBERSECURITY
Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk tha...

Have you been affected by the cyber attack?
HAVE YOU BEEN AFFECTED BY THE CYBER ATTACK?
PowerON recently shared a blog ‘WannaCry NHSCyberAttack and what can be done to prevent or mitigate’ where Steve Beaumont discusses how the attack could have been avoided (hindsight is a wonderful thing) and the Microsoft solutions available to help eliminate future risks. For those inte...

Exploits: How they work and how to crush them
EXPLOITS: HOW THEY WORK AND HOW TO CRUSH THEM
Geared for the IT administrator, but open to anyone interested in cyber security. What are exploits? How do they work? What makes them so dangerous? And what can be done to protect your users and network against exploit-based attacks? Learn this and more as Malwarebytes researchers tackle one of the...

An Inside View of a Zero-Day Campaign
AN INSIDE VIEW OF A ZERO-DAY CAMPAIGN
At a recent SC Congress eSymposium, Malwarebytes' malware crushing experts delivered an insightful look inside a zero-day malware attack campaign. Since traditional anti-virus approaches leverage lists of known malware to protect against attacks, they can become minimally effective at protecting...

Protecting Your Endpoint From Data Loss and Malware Attacks
PROTECTING YOUR ENDPOINT FROM DATA LOSS AND MALWARE ATTACKS
Learn how Dell EMC is helping customers protect endpoint data from data loss and attacks through using the Mozy backup solution. Many small to large customers use Mozy to protect critical information stored at the edge. Here are some of the things that will be covered in the session. What is Mozy on...

CYBER THREATS FOR MSPS TO WATCH IN 2017
CYBER THREATS FOR MSPS TO WATCH IN 2017
This webinar will cover: The collection of threat intelligence and its importance in combating cyber threats. Which threats are likely to be seriously problematic - and dangerous for MSPs - through 2017 . What businesses need to know about the threat landscape . The resources and tools that MSPs can...

The Role of Ethical Hacking in Cyber Security
THE ROLE OF ETHICAL HACKING IN CYBER SECURITY
Hacking isn’t inherently bad and comes in many colors: black, white, and all shades in between. Cybersecurity relies on white hat hackers. “White hat” or Ethical Hacking is key to strengthening network security. It also involves thinking like a “black hat” hacker (those...

CyberSecurity: What You Need to Know for 2017?
CYBERSECURITY: WHAT YOU NEED TO KNOW FOR 2017?
In this webinar, our security expert, Sam Cattle will bring you up to speed on the latest in security while exploring software updates and technologies from Dell EMC. He also discusses best practices for employee training. This is a great webinar to watch before you head to the RSA Conference 2017.

Cybersecurity for Small Businesses: Cyber Threats, Security Best Practices & Resources
CYBERSECURITY FOR SMALL BUSINESSES: CYBER THREATS, SECURITY BEST PRACTICES & RESOURCES
Today there is report after report of a high profile cyber attack or breach. Hackers are getting more bold and small businesses are fast becoming prime targets for these attacks. Cybersecurity: It's Your Business" reviews: Cyber Threats Actors, Types of Cyber Threats, Reasons Hackers Target...

Psychological Warfare: How CyberCriminals Mess With Your Mind
PSYCHOLOGICAL WARFARE: HOW CYBERCRIMINALS MESS WITH YOUR MIND
Today’s cyber attacks utilize themost complex threat technologies to infiltrate users' computers. Yet much ofthe danger actually lies outside of the code. When attackers combine atechnological attack with psychology—a social engineering tactic similar toadvertising—their reach ...

Launch, Detect, Evolve: The Mutation of Malware Webinar
LAUNCH, DETECT, EVOLVE: THE MUTATION OF MALWARE WEBINAR
In order to hit their targets, malware developers need to constantly evolve their tactics. This evolution is frequently done in very small incremental changes to known malware attacks. Today, malicious developers know their malware has a short half-life before detection. In order to optimize their e...

2015: The Year of the Flash Zero-Days
2015: THE YEAR OF THE FLASH ZERO-DAYS
Throughout 2015, there seemed to be a never ending exploit of Adobe Flash. Every time a patch was released, cybercriminals found another security hole. And IT admins everywhere struggled to keep pace with the patches.

How Malware Evades Common Prevention Solutions
HOW MALWARE EVADES COMMON PREVENTION SOLUTIONS
The continual evolution of cyber threats provides a challenge to accepted security controls and prevention solutions. In this webinar, we examine the question – are the measures you have implemented enough to keep your assets safe? Topics covered include anti-virus and sandbox concepts, and th...

Learning How Hackers Hack
LEARNING HOW HACKERS HACK
Placing yourself in the shoes of a hacker and attacking your own computer systems is likely the most effective way of uncovering your security vulnerabilities. Penetration testing or pen testing helps organizations to probe their own systems for weaknesses that could lead to a breach.

Shut Down Mirai and DDoS Attacks on Your Organization
SHUT DOWN MIRAI AND DDOS ATTACKS ON YOUR ORGANIZATION
Mirai botnet attacks continue to rise, using IoT devices to flood targeted websites in order to overload servers and disrupt service. These Mirai-infected devices have been uncovered in 164 countries, successfully attacking several organizations.

The Anatomy of a Phishing Attack
THE ANATOMY OF A PHISHING ATTACK
Phishing attacks account for the vast majority of all cybercrime and is by far the most lucrative. Tens of millions of phishing e-mails are sent annually and because of the improved sophistication of both the appearance and technology of the messages, users are being tricked more than ever.

How to Recognize and Prevent Social Engineering Attacks
HOW TO RECOGNIZE AND PREVENT SOCIAL ENGINEERING ATTACKS
Social engineering is nothing new. From the Trojan Horse that collapsed Troy to Frank Abagnale's famous deceptions portrayed in the film Catch Me If You Can, conmen and hackers have preyed on people’s innate tendency to trust. We invite you to listen in as internationally recognized techno...

Strengthen Your Human Firewall with Social Engineering Awareness Training and Simulated Phishing Tests
STRENGTHEN YOUR HUMAN FIREWALL WITH SOCIAL ENGINEERING AWARENESS TRAINING AND SIMULATED PHISHING TESTS
Social engineering is the number one security threat to any organization, making your employees the weakest link in your IT security. Learn how the TracePhishing Simulator: Strengthens your organization's human firewall by leveraging TraceSecurity's best-practice methodology.

MIB Hosting Social Engineering Webinar
MIB HOSTING SOCIAL ENGINEERING WEBINAR
Ethical Hacker, Information Security Expert, Penetration Tester and Social Engineer Steve Stasiukonis will explain the numerous ways business network can be compromised.The presentation will explain Social Engineering techniques and how white-collar criminals leverage the use of common people, proce...

Social Engineering and Email Security Survey
SOCIAL ENGINEERING AND EMAIL SECURITY SURVEY
How Prepared is Your Enterprise to Defend Against Targeted Socially-Engineered Attacks? 46% of surveyed security leaders say their organizations have been victimized by at least one socially-engineered attack in the past year.

How to Respond to Cybersecurity Incidents Faster, Smarter, Better
HOW TO RESPOND TO CYBERSECURITY INCIDENTS FASTER, SMARTER, BETTER
This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation – aligning security teams’ people, process, and technologies into a single hub for incident response.

3 Key Trends in Application Security, feat. Forrester
3 KEY TRENDS IN APPLICATION SECURITY, FEAT. FORRESTER
Even though attacks on Web applications account for only 8% of reported security incidents, they account for 40% of breaches – the single biggest layer of data loss. So, what are organizations doing today to protect their applications?

Main Cyber Attack Destinations in 2016
MAIN CYBER ATTACK DESTINATIONS IN 2016
The big story for Q1 2016 in the digital identity network is that although authentication continues to be a key imperative for global digital businesses, attacks are evolving and becoming more pernicious and hugely widespread, including more mobile attacks than ever before. In Q1 alone, 411 million ...

What Suppliers Don
WHAT SUPPLIERS DON'T TELL YOU ABOUT SECURITY?
When parts of a business process are outsourced, how can you as a customer assess that your supplier provides secure services? Of course, certification of their security management process gives some trust, but control is better. This presentation is about a practical approach to check vendor securi...

A Team-Based Approach to CyberSecurity
A TEAM-BASED APPROACH TO CYBERSECURITY
In this webinar we discuss techniques for empowering your organization, security teams – through executives, with the information the organization needs to combat cyber criminals and respond when the inevitable breach occurs.CyberSecurity breaches mean big losses for companies, including headl...

How to improve resilience and respond better to Cyber Attacks with ISO 22301?
HOW TO IMPROVE RESILIENCE AND RESPOND BETTER TO CYBER ATTACKS WITH ISO 22301?
Main points covered: Can cyber-attacks and information security breaches can impact your business continuity? How you can use your business continuity and incident management plans to effectively respond to cyber-attacks; and How ISO 22301 will ensure that you have effective plans in place and can i...

Surviving the OCR Cybersecurity & Privacy Pre-Audit
SURVIVING THE OCR CYBERSECURITY & PRIVACY PRE-AUDIT
Much like JACHO, the OCR has been auditing the privacy and security policies of healthcare organizations in a proactive manner. Many healthcare organizations are surprised to learn that they are not prepared to successfully get through an OCR pre-audit. Thankfully getting your house in order isn&rsq...

NSA Hacking Tools Exposed Pt 2: Are You Protected?
NSA HACKING TOOLS EXPOSED PT 2: ARE YOU PROTECTED?
The ‘Shadow Brokers’ have recently released a new cache of malware exploits into the wild in which our NSF Threat Intelligence Researchers were able to reverse engineer and ‘sandbox’ for analytical purposes. With this noted, very sophisticated malware strains developed at the...

The difference between Cybersecurity and Information Security
THE DIFFERENCE BETWEEN CYBERSECURITY AND INFORMATION SECURITY
Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of information technology (IT).

4 Pillars Every Organization Needs When Implementing Cybersecurity Strategies
4 PILLARS EVERY ORGANIZATION NEEDS WHEN IMPLEMENTING CYBERSECURITY STRATEGIES
The webinar provides insightful information on the most significant cyber security strategies that every organization needs, in order to respond effectively and professionally to cyber threats. In addition, building a culture of safety in your organization is the key to protecting the integrity of a...

6 Steps to Secure Your Organization from Cybersecurity Threats
6 STEPS TO SECURE YOUR ORGANIZATION FROM CYBERSECURITY THREATS
This webinar will deliver exclusive information on the international best practices in securing the integrity of organizations from cyber-attacks. Get to know in details on how to apply proper security measures and secure your organization from cybersecurity threats.

MCG Cybersecurity Webinar: Risk Management for Small Business
MCG CYBERSECURITY WEBINAR: RISK MANAGEMENT FOR SMALL BUSINESS
Learn the five steps all businesses must follow to protect themselves from costly data breaches. This will be the first of a monthly series to educational webinars for small business leaders. Knowing is the first step in protecting your business.

National Small Business Week with Vision Computer Solutions: Cyber Security 101
NATIONAL SMALL BUSINESS WEEK WITH VISION COMPUTER SOLUTIONS: CYBER SECURITY 101
National Small Business Week is an annual week aimed at small and medium-sized business growth in all industries. In an effort to amplify National Small Business Week in Michigan. Vision Computer Solutions took part in a series of three 30-minute webinars to Michigan Chamber Partners all across the ...

Digital Fire Cyber Security Webinar
DIGITAL FIRE CYBER SECURITY WEBINAR
Have you taken a step back to look at your business’ IT security plan? Do you have the proper measures in place to prevent an attack? Do you have proper network security? I bet you are thinking there is no way your business is at risk.

GROWING CYBERSECURITY THREATS TO THE ENERGY AND INDUSTRIAL SECTORS
GROWING CYBERSECURITY THREATS TO THE ENERGY AND INDUSTRIAL SECTORS
Learn about the most high-profile attacks on energy and industrial sectors and how they were executed. THE IMPACT Explore the strategies employed by different actors to infect machines, disrupt business functions, and compromise intellectual property.

HOW HACKERS EXPLOIT WEAK PASSWORDS
HOW HACKERS EXPLOIT WEAK PASSWORDS
Learn How You Can Help Your Organization Manage Passwords and Avoid Catastrophic Data Breaches.

Phishing 101: Don
PHISHING 101: DON'T TAKE THE BAIT
Learn how to spot the signs of an attack. Get to know the various types of phishing campaigns. Understand who is being targeted & why.

2017 Top 5 Cybersecurity Threats
2017 TOP 5 CYBERSECURITY THREATS
Discover the Most Dangerous Cybersecurity Threats of The New Year. Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research and operations for NopSec. Michelangelo holds numerous professional certifications in information security including CISSP, CISA...

Cyber security and process network control for internal auditors
CYBER SECURITY AND PROCESS NETWORK CONTROL FOR INTERNAL AUDITORS
When it comes to cyber security, it is not just the financial systems that you need to worry about. The risk is far greater on the operational side, terrorists and criminals can attack your business and they can do it online. If terrorists accessed a chemical or nuclear plant then catastrophic damag...

Black Hat 2015 Findings – Staying Ahead of Malware
BLACK HAT 2015 FINDINGS – STAYING AHEAD OF MALWARE
2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.

Asymmetric Resilient Cybersecurity
ASYMMETRIC RESILIENT CYBERSECURITY
We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means.

Cyber Attack Trends 2017 and Beyond: Protecting Your Business in Cyberspace
CYBER ATTACK TRENDS 2017 AND BEYOND: PROTECTING YOUR BUSINESS IN CYBERSPACE
As the scale and sophistication of cyber-attacks increases, coupled with new legislation and the complexity of technology, businesses need to manage risk in ways beyond those traditionally handled by the information security function.

2017 Threat Landscape: Increased Sophistication, or More of the Same?
2017 THREAT LANDSCAPE: INCREASED SOPHISTICATION, OR MORE OF THE SAME?
As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and threats. So what are the key takeaways and how can global security events from the past 12 months inform your plans for 2017.

Mobile Security: 2016 Wrap-Up and 2017 Predictions
MOBILE SECURITY: 2016 WRAP-UP AND 2017 PREDICTIONS
2016 has been a fully packed year for mobile security, with the first major public exposure of sophisticated state-sponsored cyber espionage, and the evolution of mobile spyware technology for corporate espionage.

Mobile Security Threats & ESET Endpoint Security for Android
MOBILE SECURITY THREATS & ESET ENDPOINT SECURITY FOR ANDROID
Looking to improve mobile device security, protect remote workers and reduce costs? Then join this webinar detailing how ESET endpoint security for Android can handle all the latest threats—without the need for a costly MDM system.

Next-level mobile app security: A programmatic approach
NEXT-LEVEL MOBILE APP SECURITY: A PROGRAMMATIC APPROACH
Name a mobile app security challenge and chances are Katie Strzempka, VP Customer Success and Services at NowSecure, has developed and implemented a solution. Fresh off the publication of her Mobile App Security Program Management Handbook, Katie will share her experiences helping numerous enterpris...

Three Secrets to Becoming a Mobile Security Superhero
THREE SECRETS TO BECOMING A MOBILE SECURITY SUPERHERO
Learn how to become the mobile security superhero at your company by following these 3 steps:  Prove to your management that mobile security threats are real by showing real examples. Review the SANS Institute checklist to help choose the right mobile threat defense solution.

Intelligent Security: Balancing Information Security Risks and Priorities
INTELLIGENT SECURITY: BALANCING INFORMATION SECURITY RISKS AND PRIORITIES
As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to p...

Stroke of genius; The only known way to fully protect against keystroke loggers
STROKE OF GENIUS; THE ONLY KNOWN WAY TO FULLY PROTECT AGAINST KEYSTROKE LOGGERS
Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other ...

Dealing with DDoS Application Threats in Mobile Networks
DEALING WITH DDOS APPLICATION THREATS IN MOBILE NETWORKS
The publicity given to devastating cyber-attacks on companies like Sony Pictures leads some mobile operators to believe that the uniqueness of the mobile network, service and device environment means they are nowhere near as vulnerable to DDoS and Advanced Persistent Threats (APT). Leveraging Heavy ...

Making Cybersecurity Manageable with High-Fidelity Security
MAKING CYBERSECURITY MANAGEABLE WITH HIGH-FIDELITY SECURITY
The volume and sophistication of IT threats is putting unprecedented pressure on security teams. With limited time and manpower, security teams need the right combination of visibility, intelligence and context to find threats in real-time before damage is done.

How to detect hidden cyberattack communications inside today’s networks
HOW TO DETECT HIDDEN CYBERATTACK COMMUNICATIONS INSIDE TODAY’S NETWORKS
Today’s cyber attackers survive by hiding their attack communications from the prying eyes of security. It’s a critical part of their attack arsenal and it lets them patiently manage and propagate attacks throughout your network, undetected.

Automatically quarantine endpoints based on network attack behavior detections
AUTOMATICALLY QUARANTINE ENDPOINTS BASED ON NETWORK ATTACK BEHAVIOR DETECTIONS
Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically pivot from real-time attack behavior detections in the Vectra UI to Carbon Black Response to expedite forensic investigation and isolate compromised hosts.

2017 Phishing Trends & Intelligence Report
2017 PHISHING TRENDS & INTELLIGENCE REPORT
The PhishLabs 2017 Phishing Trends and Intelligence Report reveals a profound shift in the overall cyber threat landscape. During this webinar, Senior Security Threat Researcher, Crane Hassold, goes into detail about widespread login practices that have left most industries and consumers vulnerable ...

Dridex: Chasing a Botnet from the Inside
DRIDEX: CHASING A BOTNET FROM THE INSIDE
In light of recent news about Dridex takedown, AnubisNetworks Labs team would like to take this webinar to share with the community some of the efforts undertaken during this investigation led by the NCA, with our participation, to track this malware and exploit its communication channels.In March 2...

Rise of the Zombie Army - A Study of Botnets
RISE OF THE ZOMBIE ARMY - A STUDY OF BOTNETS
From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating ma...

SANS: Implementing Active Breach Detection
SANS: IMPLEMENTING ACTIVE BREACH DETECTION
Watch this SANS webinar led by SANS Analyst David Shackleford to learn more about the critical role detection needs to play in a successful security strategy. He asks the question -- "Do you have confidence you can prevent 100 percent of intrusion attempts, and if not, can you find the attacker...

CYBER SECURITY: ARE YOU READY FOR 2017?
CYBER SECURITY: ARE YOU READY FOR 2017?
Akamai Security on demand webinar — in partnership with (ISC)2. DDoS Threats of Past, Present, and Future. Learn the latest stats and trends on Distributed Denial of Service (DDoS) attacks. You will learn: Historical developments in the DDoS threat landscape.

WEAPONS OF MASS DESTRUCTION - SOCIAL ENGINEERING
WEAPONS OF MASS DESTRUCTION - SOCIAL ENGINEERING
The 2016 Verizon Data Breach Investigations Report suggests that 30% of people will open a phishing email. With hundreds of thousands of people working in financial institutions around the country, we have a high potential level of risk. Cybercriminals have also weaponized tools into phishing emails...

Building a Career Pathways System for Cybersecurity
BUILDING A CAREER PATHWAYS SYSTEM FOR CYBERSECURITY
There has been considerable progress in the development of academic and transfer pathways for cybersecurity; however, the evolution of cybersecurity as a career within organizations has made it difficult to define a career pathway for cybersecurity. The CyberSeek Career Pathway portal is one example...

Cybersecurity Games: Building Tomorrow’s Workforce
CYBERSECURITY GAMES: BUILDING TOMORROW’S WORKFORCE
Join us during Computer Science Education Week as we discuss the growing momentum in computer science education and how cybersecurity can help support this growing effort. The U.S. House of Representatives has designated December 5-11, 2016 as Computer Science Education Week (CSEdWeek) in recognitio...

Cybersecurity for Computer Science
CYBERSECURITY FOR COMPUTER SCIENCE
Join us for a NICE Webinar that will inform attendees on how to contribute to the empowerment of cybersecurity competitions in the public and private ecosystem.Competitions encourage players to practice, hone cybersecurity skills, and build confidence in a controlled, real-world environment.  T...

How to Build Internal Collaboration for Effective Cybersecurity
HOW TO BUILD INTERNAL COLLABORATION FOR EFFECTIVE CYBERSECURITY
An effective structure for managing information risk begins with collaboration across stakeholders. Malcolm Harkins will be speaking with Phillip Cantu, Cybersecurity and Technology Risk Management Leader, about developing partnerships with internal groups to ensure decisions about security keep pac...

Intro to Intercept: Stop Ransomware Before It Strikes
INTRO TO INTERCEPT: STOP RANSOMWARE BEFORE IT STRIKES
Ransomware is the #1 malware attack affecting organizations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to business productivity. Sophos Intercept X prevents the malicious spontaneous encryption of data by all forms of ransomware – ...

Botnets: Is Your Network Really Protected?
BOTNETS: IS YOUR NETWORK REALLY PROTECTED?
October’s Mirai botnet was the largest in history, taking down Twitter, CNN, Netflix and the Guardian to name a few. Chris will explain how you can stop hackers from hijacking your network. We’ll discuss what you need to know about today’s network threat landscape; how today’...

Next-Gen Now: Outsmarting rootkits, ransomware, and zero-day attacks.
NEXT-GEN NOW: OUTSMARTING ROOTKITS, RANSOMWARE, AND ZERO-DAY ATTACKS.
From rootkits to ransomware, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work, and how to protect against them. Join Dan Schiappa, GM for Sophos Enduser Security Group, for a live webcast on Next-Generation Enduser Protection and learn how you ca...

Stopping Tomorrow’s Attacks Today: a next-gen approach for advanced threats
STOPPING TOMORROW’S ATTACKS TODAY: A NEXT-GEN APPROACH FOR ADVANCED THREATS
Watch this on-demand webinar and get practical advice from Sophos security expert, John Shier, on how to protect your organization and combat today’s advanced threats. We will address social engineering, malware, and exploitation techniques.

Top 10 Zero-Day Exploits of 2015
TOP 10 ZERO-DAY EXPLOITS OF 2015
Despite the continuous advancements in cyber security in 2015, most organizations remain entirely exposed to targeted cyber attacks that leverage zero-day exploits. The traditional antivirus and endpoint security solutions are no longer effective. How can organizations prevent security breaches that...

Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention
PREVENTION WEEK PART 2: DEFEAT ZERO-DAY EXPLOITS BY AUTOMATING PREVENTION
Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?In this webinar, you’ll discover a r...

Risk Based Security in a Hyper-Connected World
RISK BASED SECURITY IN A HYPER-CONNECTED WORLD
For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioural analytics, big data solutions, and “one touch” processes that require no manual intervention, companies are always on the lookout for technology innovations that can a...

Digital Banking Trends, Security Risks and Counter Measures
DIGITAL BANKING TRENDS, SECURITY RISKS AND COUNTER MEASURES
There are no doubts that we are at the beginning of an exciting era of transformations in the digital banking space because there are many important trends around us that is fueling this shift. Examples - the increase in the number of smart phones and mobile internet usage, entry of non traditional/...

Privileged Accounts and the Cyber Attack Life Cycle
PRIVILEGED ACCOUNTS AND THE CYBER ATTACK LIFE CYCLE
Privileged Accounts and the Cyber Attack Life Cycle. This webinar focuses on how attackers find their way to the heart of enterprises, the role privileged credentials (passwords and SSH keys) play in an active cyber attack, and how the integration of CyberArk Privileged Account Security Solution and...

Third-Party Remote Access The Hidden Weak Spot Exploited by Attackers
THIRD-PARTY REMOTE ACCESS THE HIDDEN WEAK SPOT EXPLOITED BY ATTACKERS
Today, outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support. Many companies overlook this remote vendor access as an ...

Cybersecurity – Pushing Past Compliance
CYBERSECURITY – PUSHING PAST COMPLIANCE
Watch this recorded webinar that explores the timeline from the 2015 breach of the Office of Personnel Management (OPM), to the mandated 30-day Cybersecurity Sprint for Federal Civilian Government, to what has now evolved into a cyber marathon for many agencies.

FFIEC CYBERSECURITY ASSESSMENT TOOL - WHAT YOU NEED TO KNOW
FFIEC CYBERSECURITY ASSESSMENT TOOL - WHAT YOU NEED TO KNOW
The Federal Financial Institutions Examination Council, or FFIEC has made great strides to provide the tools for financial institutions to protect themselves from cyber criminals. The need to use it is apparent, as hackers have become more innovative and their tools have become more advanced.

The Next Step in Cyber Defense and Response – How to Respond to Today’s Cyber Attack Trends and Security IT Challenges
THE NEXT STEP IN CYBER DEFENSE AND RESPONSE – HOW TO RESPOND TO TODAY’S CYBER ATTACK TRENDS AND SECURITY IT CHALLENGES
As the threat landscape continues to grow, organizations must have a single point of view of their entire connected environment to keep their digital assets secure, this webinar will focus on the new tasks in cyber defence as control becomes looser in the grip of the CISO.. As the threat landscape c...

Phishing, Malware and Incidents – Oh my! How to handle the daily deluge.
PHISHING, MALWARE AND INCIDENTS – OH MY! HOW TO HANDLE THE DAILY DELUGE.
No one understands the strain of constant battle better than those in Incident Response (IR). Daily cyber assaults require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has bee...

Phishing Awareness and Response: Can Technology Alone Make a Difference?
PHISHING AWARENESS AND RESPONSE: CAN TECHNOLOGY ALONE MAKE A DIFFERENCE?
Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection. That technology- those investm...

Latest Attack Trends: Why Employees get Hooked by Phishing Emails
LATEST ATTACK TRENDS: WHY EMPLOYEES GET HOOKED BY PHISHING EMAILS
Phishing (including spear phishing), persists as the #1 attack vector used by hackers today – and they continue to launch more sophisticated tactics to gain access to corporate networks and assets. But, did you know these alarming statistics?  -87% of the employees who opened a phishing s...

One Step Ahead of Phishing Attacks
ONE STEP AHEAD OF PHISHING ATTACKS
Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing c...

Caught in the Net: Effective Defence Against Phishing Attacks
CAUGHT IN THE NET: EFFECTIVE DEFENCE AGAINST PHISHING ATTACKS
Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.  Despite multiple security defense layers and many hours and dollars spent on end-user training, phish...

The Top Ten Phishing Lures of 2015
THE TOP TEN PHISHING LURES OF 2015
Phishing is without a doubt one of the biggest security threats to business today and cybercriminals are constantly modifying these threats in a bid to make them harder for humans and technology to detect. In this webinar, Proofpoint will be looking at the top 10 phishing lures of 2015 and the trick...

The Best Defense Against Cyber Attacks You’ve Never Heard Of.
THE BEST DEFENSE AGAINST CYBER ATTACKS YOU’VE NEVER HEARD OF.
With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people. The adversary is an intelligent actor – while the target is often human as...

Technology Can Stop Phishing Breaches? Oh, Really??
TECHNOLOGY CAN STOP PHISHING BREACHES? OH, REALLY??
Ransomware was the #1 cybersecurity threat in 2016. Phishing continues to thrive as the #1 attack vector used by hackers today. And technology continues to fail to stop it.  In 2016, spear-phishing attacks rose 55%, Ransomware attacks grew 4X and Business Email Compromise (BEC) losses skyrocket...

2016 Malware Year in Review: Tricks, Threats, and Triumphs
2016 MALWARE YEAR IN REVIEW: TRICKS, THREATS, AND TRIUMPHS
In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.

Enterprise Susceptibility Trends – Can conditioned employees turn the tide again
ENTERPRISE SUSCEPTIBILITY TRENDS – CAN CONDITIONED EMPLOYEES TURN THE TIDE AGAIN
Phishing (including spear phishing), persists as the #1 attack vector used by hackers today. So far in 2016, spear-phishing attacks are up 55%, Ransomware attacks are up 4X and Business Email Compromise (BEC) losses are up 1300%.PhishMe analyzed customer responses to over 56 million simulated phishi...

Phishing Readiness: People can be the weakest link
PHISHING READINESS: PEOPLE CAN BE THE WEAKEST LINK
Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

10 Things I Learned by Phishing My Company
10 THINGS I LEARNED BY PHISHING MY COMPANY
Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your ...

eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong?
ESUMMIT 2 - PHISHING ATTACKS AND FORENSICS – WHERE DID IT ALL GO WRONG?
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capab...

Is Phishing and Ransomware a Critical Issue for you yet?
IS PHISHING AND RANSOMWARE A CRITICAL ISSUE FOR YOU YET?
Ransomware and Phishing attacks have become a significant issue in organisations both large and small. The possibility of major business disruption arising from falling victim to Phishing or Ransomware is quite high, given that roughly 156 million phishing emails are sent globally every day.

Phishing Readiness: Is your team ready?
PHISHING READINESS: IS YOUR TEAM READY?
Phishing continues to be one of the most prevalent and effective threats to organizations. Combating hackers that are determined to compromise your users requires a unique blend of tools, strategy and training.Join our webinar to learn about: How to train your users to recognize these attacks more e...

Phishing Prevention: Be Suspicious and Don
PHISHING PREVENTION: BE SUSPICIOUS AND DON'T GET HOOKED
Although it’s been around for years, phishing is still one of the most common and effective online scams – and it just continues to grow. In Q1 2016 alone, phishing attacks grew approximately 250 percent. There were more phishing attacks during that three-month span than any other since ...

Why you need Phishing Incident Response
WHY YOU NEED PHISHING INCIDENT RESPONSE
Even with all your processes and technology in place, phishing attacks containing ransomware and other malware continue to penetrate your defenses. With 91% of all attacks on enterprise networks being the result of successful phishing attempts, organizations need an efficient and effective phishing ...

APT Threat Actors Prefer Phishing
APT THREAT ACTORS PREFER PHISHING
APT threat actors frequently have access to advanced resource and sponsors with deep pockets yet their preferred attack vector continues to be through phishing. This presentation explores the motivations, toolset, and attack surfaces of some of the world’s most prolific APT groups. Examples of...

Ponemon Institute: The State of Cyber Resilience in Europe in 2017
PONEMON INSTITUTE: THE STATE OF CYBER RESILIENCE IN EUROPE IN 2017
As cyber security attacks continue to grow and become more complex, organisations today need to be able to adapt and defend their data from incoming threats. Cyber Resilience is more critical – and harder to achieve than ever.Join our latest webinar on 8th of March at 14:00 GMT/ 15:00 CET, to ...

Ransomware: How to Avoid Extortion
RANSOMWARE: HOW TO AVOID EXTORTION
The threat of ransomware is very real. Studies have found that it has hit one in three companies. And crypto-ransomware like Cryptolocker and Cryptowall are the scourge of the web – and with new and ever-more sophisticated variants springing up rapidly this year, have become the tool of choice...

Modernizing your Application Security Program
MODERNIZING YOUR APPLICATION SECURITY PROGRAM
Businesses are pushing developers to modernize applications in order to keep up with the fast-moving world of e-commerce and digital services. Is your security program keeping up? Or is security bolted on as an after-thought, with usability and features being pushed out without a thought for how use...

Data Transfer: Stay in Focus, Stay Secure
DATA TRANSFER: STAY IN FOCUS, STAY SECURE
With companies needing the ability to do business whenever and wherever, an effective and efficient data transfer or integration network across the borderless enterprise is not just business critical it is fundamental.

Preparing For the GDPR Without Feeling The Pinch
PREPARING FOR THE GDPR WITHOUT FEELING THE PINCH
Within the next two years, the European Union proposes to create a new, single data protection law for all 28 member states. The new law – called the General Data Protection Regulation – not only harmonizes data protection across the EU. It will also bring in a number of key, new measure...

Security Incidents are the New Normal - Common Gaps in Network Security Strategies
SECURITY INCIDENTS ARE THE NEW NORMAL - COMMON GAPS IN NETWORK SECURITY STRATEGIES
In a survey conducted by Forescout and Frost & Sullivan last October, the reality of how many “serious incidents” were faced by large enterprises is discussed. The results are shocking, in this webinar we will look at the results and dissect the findings to demonstrate how businesses...

The Future of Security – Connecting Endpoint and Network for Better Protection
THE FUTURE OF SECURITY – CONNECTING ENDPOINT AND NETWORK FOR BETTER PROTECTION
To paraphrase the famous book and film: security is no country for old men. Tradition in some industries may be acceptable but in security, tradition can lead to weaknesses that can be exploited by cyber criminals. Innovation is the key – this is certainly the route taken by the attackers.Cybe...

Break Out Of the Security Silo with Adaptive Platforms
BREAK OUT OF THE SECURITY SILO WITH ADAPTIVE PLATFORMS
The latest targeted attacks are driving a shake-up in security architectures. Today’s targeted attacker is adaptive, persistent and can easily bypasses controls that exist in traditional silos. What this means is that disconnected security controls now have to be integrated and that you may we...

The Nightmare After Christmas: Plugging the Mobile Security Gap
THE NIGHTMARE AFTER CHRISTMAS: PLUGGING THE MOBILE SECURITY GAP
Personal devices are now very capable and every bit as powerful as PCs were a few years ago. And people expect to be able to use their devices at work: Mobile is the new normal. This holiday season, mobile devices - especially tablets or cell phones  -are likely to be once again set to be a ver...

Protecting Your Moving Data – What to Consider When Implementing IT Controls to Comply with GDPR
PROTECTING YOUR MOVING DATA – WHAT TO CONSIDER WHEN IMPLEMENTING IT CONTROLS TO COMPLY WITH GDPR
The general data protection regulation (GDPR) took a major leap forward in December as the EU Parliament and Council agreed on a text for the bill. When approved, the GDPR will become law in 2018 across all 28 EU Member States and will supersede inconsistent laws across the EU Member States. Upon ra...

Human Hacking; The Art of Social Engineering
HUMAN HACKING; THE ART OF SOCIAL ENGINEERING
Industry analysts, security researchers and experts can all agree on one security constant: Your people are your biggest security vulnerability. With that trend being continuous, social engineers have capitalized on this vulnerability, making social engineering one of the biggest security challenges...

Cybersecurity in the Commercial Facilities Sector
CYBERSECURITY IN THE COMMERCIAL FACILITIES SECTOR
Our commercial facilities are constantly under assault by bad actors. The webinar offered expertise on how seriously they are taking the issue and what steps are being taken to secure commercial data. This webinar is part of a new series entitled “Critical Infrastructure” that covers the...

Protecting Yourself from Top Threats in 2017
PROTECTING YOURSELF FROM TOP THREATS IN 2017
In 2016 attackers raised the stakes and became more organized in the effort to monetize pirated systems and proliferate data.  We’ll cover the trends and some of the new interesting exploits while providing strategies on how to best defend against what may come in 2017.  Whether you&...

Next Steps in Malware Protection
NEXT STEPS IN MALWARE PROTECTION
The limitations of traditional malware protection.What to expect from malware protection. systems detecting malware in the network. How to best improve endpoint security beyond standard antivirus. Traditional malware protection fails to guard against some of the latest threats. New technologies are ...

Using Threat Intelligence to Stop Cyber Attacks
USING THREAT INTELLIGENCE TO STOP CYBER ATTACKS
How can enterprises use threat intelligence data to detect and stop attackers more quickly and efficiently? How can security teams identify the relevant threat information and use it to develop a swift defense? What specific threat information is needed, and how can enterprises use it to stop a part...

The Cyber Threat at Your Doorstep: Location-Specific Threat Intelligence
THE CYBER THREAT AT YOUR DOORSTEP: LOCATION-SPECIFIC THREAT INTELLIGENCE
Where your company is located affects its cyber health and physical security. Even though the internet has no borders, the closer an adversary is to your physical location the more harm they can inflict. To fully know the level of cyber risk, organizations must understand the location-specific threa...

Prioritizing Cyber Threats With Real-Time Threat Intelligence
PRIORITIZING CYBER THREATS WITH REAL-TIME THREAT INTELLIGENCE
Creating a threat intelligence strategy is essential for a company to identify and prioritize threats effectively. Curating the necessary relevant data for this strategy, however, can be incredibly time consuming and resource intensive.  In this webinar, Greg Reith, Threat Intelligence Analyst ...

Ransomware on the Dark Web: How the Underground Economy Works
RANSOMWARE ON THE DARK WEB: HOW THE UNDERGROUND ECONOMY WORKS
Ransomware can be more disturbing and damaging than any other cyber crime, and payouts seem to be on the rise. Now, a new brand of extortion is emerging, where criminals threaten to sell data obtained from ransomware campaigns on the cyber criminal underground. Join this webinar to learn about the m...