home.aspx
 
.

Webinars

AI, machine learning, behavioral analysis and blockchain: The next generation of cybersecurity
AI, MACHINE LEARNING, BEHAVIORAL ANALYSIS AND BLOCKCHAIN: THE NEXT GENERATION OF CYBERSECURITY
April 15-15, 2020
AI, machine learning, behavioral analysis, and blockchain are on the bleeding edge of security solutions technology, and may be the key to current and future threat detection and mitigation. While many companies are just beginning to explore uses for these technologies, many security technology vend...

Ransomware Preparedness & Recovery
RANSOMWARE PREPAREDNESS & RECOVERY
April 15-15, 2020
Ransomware is the epitome of cybersecurity threats and has proven to be one of the most prominent methods of cyberattack in 2019. In fact, the cost of an average data breach to companies worldwide is $3.86 million, according to a study by Norton Security. In addition, IDG says that total cyber-crime...

The 2020 State of IBM i Security: Threats, Trends, and Predictions
THE 2020 STATE OF IBM I SECURITY: THREATS, TRENDS, AND PREDICTIONS
April 15-15, 2020
Cyber threats are becoming more ferocious than ever. What are IBM i pros doing in 2020 to keep up? Join this live webinar for new data on the IBM i security controls deployed at organizations around the globe. Security experts Robin Tatam and Sandi Moore will reveal intelligence gathered from hundre...

Zero Trust: A Cybersecurity Essential and the Key to Success
ZERO TRUST: A CYBERSECURITY ESSENTIAL AND THE KEY TO SUCCESS
April 16-16, 2020
In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated. The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates. Tha...

New Insights and Research Into Attack Surface Reduction
NEW INSIGHTS AND RESEARCH INTO ATTACK SURFACE REDUCTION
April 16-16, 2020
Most organizations believe they have their network locked down: they know what they have exposed to the Internet and what they have safely protected behind the firewall. But the truth is that almost no major organization has a complete picture of its true Internet attack surface. This webinar will e...

CORONAVIRUS UPDATE: The latest cyber security threats facing consumers & SMEs
CORONAVIRUS UPDATE: THE LATEST CYBER SECURITY THREATS FACING CONSUMERS & SMES
April 16-16, 2020
In this webinar series we will be providing updates on the latest cyber security threats and how to reduce your online risks. If you missed the first webinar in this series, we covered vulnerable industries, hacking group MAZE and discussed examples of COVID-19 specific business and consumer threats...

How to remove the data security risk from file transfers
HOW TO REMOVE THE DATA SECURITY RISK FROM FILE TRANSFERS
April 16-16, 2020
Online sharing of information has accelerated collaboration, but with the need to share information comes the risk of exposing the wrong content and the use of shadow IT. Many organisations tolerate unmonitored communications over their file transfer platforms, because they do not realise that they ...

Application Security For Developers - Learning Defence by Offense
APPLICATION SECURITY FOR DEVELOPERS - LEARNING DEFENCE BY OFFENSE
April 21-21, 2020
Join Rohit Salecha, Black Hat Trainer, and accredited Pen Tester, from NotSoSecure, discuss as web application vulnerabilities are on the rise, why it’s essential that developers are educated in response to the growing risk. In this webinar, we look at the increasing need for application secur...

The Impact of Women in Cybersecurity
THE IMPACT OF WOMEN IN CYBERSECURITY
April 22-22, 2020
While only 11% of cybersecurity workers worldwide are women, the few who’ve shattered the glass ceiling have made unmistakable history. Yet often as in many technology and engineering fields, they remain as “hidden figures” and hardly recognized for their achievements.Women, like t...

Managing the cyber risk of remote work
MANAGING THE CYBER RISK OF REMOTE WORK
April 22-22, 2020
Working remotely has meant we’ve had to rethink our approach to collaboration, productivity and delivering products and services — but what about our security? Last week, news broke that Zoom is facing a huge privacy and security backlash as experts warn the video calling software isn&rs...

Free Cybersecurity Training with customised Learning Paths
FREE CYBERSECURITY TRAINING WITH CUSTOMISED LEARNING PATHS
April 22-22, 2020
An increasing number of organisations and industry sectors rely on IT as they realise the benefits of digitisation. But along with these benefits come increasing risks of exposure to cyber-attacks. Financial costs from service interruption, data theft and reputational loss can be harmful, especially...

Compromised credential,account takeover and intelligent driven password policy
COMPROMISED CREDENTIAL,ACCOUNT TAKEOVER AND INTELLIGENT DRIVEN PASSWORD POLICY
April 29-29, 2020
As the methods used by threat actors to steal credentials evolve and leaked data is readily available online, defenders are at an ongoing disadvantage and increasingly vulnerable to account takeover, fraud, and misuse. During this webinar, Flashpoint will examine how visibility into the illicit comm...

HACKER HOUR: CYBER LAW AND INSURANCE - SURVIVING AN INCIDENT
HACKER HOUR: CYBER LAW AND INSURANCE - SURVIVING AN INCIDENT
April 30-30, 2020
Cyber insurance has become a common risk mitigation strategy to lessen the financial impact of a cyber incident. However, it's not until an incident happens that we really think about the type of coverage we carry and how it affects our ability to recover. Join SBS and Dickinson Law as we discus...

The Next Wave of Cyber-Physical Attacks
THE NEXT WAVE OF CYBER-PHYSICAL ATTACKS
April 30-30, 2020
Increased reliance on Operational Technology (OT) has become a hallmark of multiple industry verticals, from healthcare to manufacturing, energy and critical infrastructure. The sheer number of connected devices in these domains is expected to nearly double within the next four years, reaching almos...

Using SIEM to Protect Against Top Cybersecurity Threats
USING SIEM TO PROTECT AGAINST TOP CYBERSECURITY THREATS
April 30-30, 2020
There are countless ways that a businesses can make it easier for a threat actor to find their way in undetected – and the onus is on security to stop, detect and prevent the attacker from getting in the first place. This is where SIEM can enable a business, and ensure that aggregated and anal...

Is Your Threat Hunting Effective? A New SANS Survey
IS YOUR THREAT HUNTING EFFECTIVE? A NEW SANS SURVEY
May 27-27, 2020
Today, many organizations around the globe struggle with getting top-tier threat hunters. Although threat hunting has become a mandatory task to establish an acceptable level of security, the demand for skilled hunters far exceeds the number of available specialists. In this new research, SANS queri...

Avoiding the Security Pitfalls of Digital Transformation
AVOIDING THE SECURITY PITFALLS OF DIGITAL TRANSFORMATION
May 28-28, 2020
According to Gartner: “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”In the current business landscape, there’s no doubt that the we...

SPOTLIGHT

Ransomware is the epitome of cybersecurity threats and has proven to be one of the most prominent methods of cyberattack in 2019. In fact, the cost of an average data breach to companies worldwide is $3.86 million, according to a study by Norton Security. In addition, IDG says that total cyber-crime