home.aspx
 
.

Webinars

The Cycle of Cyber Threat Intelligence
THE CYCLE OF CYBER THREAT INTELLIGENCE
August 27-27, 2019
Too often, our community thinks of cyber threat intelligence (CTI) as just a finished product (or even just an indicator feed). But behind the scenes of that finished intelligence, there's an entire process that analysts should know to ensure their CTI is effective in helping drive better decisi...

Insider Threat Program Realities: New Research from ESG and Dtex Systems
INSIDER THREAT PROGRAM REALITIES: NEW RESEARCH FROM ESG AND DTEX SYSTEMS
August 27-27, 2019
Join Enterprise Strategy Group (ESG) and Dtex Systems to get a detailed look at a newly released ESG Research Insights Report, "Insider Threat Program Realities." Based on the survey of 300 security and IT professionals in the US, the report underscores the continued struggle most organiza...

Solving the Headaches of Network Security in Wireless Collaboration
SOLVING THE HEADACHES OF NETWORK SECURITY IN WIRELESS COLLABORATION
September 04-04, 2019
Wireless presentation has become a necessity for many organizations. Corporate spaces require wireless presentation solutions in every huddle room, conference room, and boardroom. Education spaces utilize wireless presentation in classrooms containing kindergartener’s and PhD candidates alike....

The Mobile Security Spectrum
THE MOBILE SECURITY SPECTRUM
September 05-05, 2019
In 2019, 33% of all malware is targeted to mobile devices while only 10% of companies have a mobile security solution in place. Mobile Security is one of the most important issues for companies, and this will only increase in the coming years when there will be even more threats. One of the reasons ...

Cybersecurity: Why MSPs Need to Practice What They Preach
CYBERSECURITY: WHY MSPS NEED TO PRACTICE WHAT THEY PREACH
September 05-05, 2019
The most recent data shows a majority of cyberattacks using Island Hopping – the art of compromising company A to attack company B.  The MSP community has become a target-rich environment, providing cybercriminals with the potential to have unfettered access to a multitude of secondary ta...

Automating Container Security with AWS and Lacework
AUTOMATING CONTAINER SECURITY WITH AWS AND LACEWORK
September 05-05, 2019
Using containers in AWS enables agile orchestration of application capabilities and require less coordination and oversight than on-premises or virtualization infrastructure. While containers allow you to build and release fast, security teams need to assess how they maintain security for these new ...

What happens if your law firm falls victim to a cyber attack?
WHAT HAPPENS IF YOUR LAW FIRM FALLS VICTIM TO A CYBER ATTACK?
September 10-10, 2019
According to reports, businesses were attacked by cyber criminals on average every 50 seconds between April and June this year. After conducting our own research of 100 law firms, we discovered that 82% of those we spoke to, didn’t have the Government recommended Cyber Essentials Accreditation...

Train Like You Fight: How to Prepare Your Organization for a Major Cybersecurity Attack
TRAIN LIKE YOU FIGHT: HOW TO PREPARE YOUR ORGANIZATION FOR A MAJOR CYBERSECURITY ATTACK
September 10-10, 2019
The financial services industry continues to be a major focus for bad actors. Understanding new attack vectors and being prepared for when a cyber incident does occur is a paramount requirement within a threat management plan for financial services organizations. Often times a lack of training, a ga...

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
HACKING YOUR ORGANIZATION: 7 STEPS BAD GUYS USE TO TAKE TOTAL CONTROL OF YOUR NETWORK
September 10-10, 2019
The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? W...

My Business Has Been Hacked! Now What?
MY BUSINESS HAS BEEN HACKED! NOW WHAT?
September 10-10, 2019
What do you do after a cyber attack on your business? Who do you and who can you reach out to for help? What steps can you take to minimize impact to your organization? Get these questions answered and more during our CyberSecure My Business webinar™ on September 10. NCSA staff and partners wi...

Alltek: How To Protect Your Business With Cyber-security Webinar
ALLTEK: HOW TO PROTECT YOUR BUSINESS WITH CYBER-SECURITY WEBINAR
September 11-11, 2019
Cyber-security has become a buzz word in the SME community over the last few years. Most business owners and senior leadership teams have heard stories of local businesses who have suffered significant losses after suffering a breach in their cybersecurity. So, what are the key points SME business l...

Cybersecurity - Challenges of today, Challenges to Come - Webinar Series
CYBERSECURITY - CHALLENGES OF TODAY, CHALLENGES TO COME - WEBINAR SERIES
September 11-11, 2019
Technology is changing faster than it ever has, and that’s creating serious new risk for Iowa manufacturers. A rapidly advancing wave of industrial progress – faster computers, better automation, plentiful sensors, and sophisticated data analysis – promises to make your company mor...

Threat Intelligence Report: Assessing Pen Testing Practices
THREAT INTELLIGENCE REPORT: ASSESSING PEN TESTING PRACTICES
September 12-12, 2019
The red line distinguishing legitimate pentesting services from threat actor behavior has thinned and, in some cases, blurred out entirely in recent years due to the lack of universally accepted industry standards for practicing pentesting tradecraft. Join us on Thursday, September 12th as BlackBerr...

Top Social and Digital Threats Facing Financial Institutions
TOP SOCIAL AND DIGITAL THREATS FACING FINANCIAL INSTITUTIONS
September 12-12, 2019
In the last several years, Financial Services organizations have undergone rapid digital transformation. They rely on social media and digital platforms to generate brand awareness, provide online banking and other financial services, and to offer support and services to customers. This has created ...

Threat Modeling Webinar: find problems when there
THREAT MODELING WEBINAR: FIND PROBLEMS WHEN THERE'S TIME TO FIX THEM
September 12-12, 2019
Applications and systems are commonly part of a chain of information-processing systems. When securing an application, system or the complete chain, it is important to know from which perspective threats arise and how a system can be attacked. Threat modeling can be incredibly valuable and cost-effe...

Data Mapping: An Essential Task for Cybersecurity and Compliance
DATA MAPPING: AN ESSENTIAL TASK FOR CYBERSECURITY AND COMPLIANCE
September 12-12, 2019
Businesses collect as much data as they can for convenience, resale, AI training and other reasons. In the past, tracking that data was at best a secondary concern; but no longer. Privacy and security laws require businesses to be more agile than ever. Businesses no longer have the luxury of time wh...

How to Audit Active Directory to Reduce IT Security Risks from Privileged Users
HOW TO AUDIT ACTIVE DIRECTORY TO REDUCE IT SECURITY RISKS FROM PRIVILEGED USERS
September 12-12, 2019
Privilege empowers. Admins and other users will, at times, require privileges—it’s an inescapable fact that is paired with an unavoidable security risk. Active Directory (AD) has many options for managing privilege—which is another way of saying that Active Directory provides many ...

Attacking and Defending Kubernetes, Scott Pilgrim Style
ATTACKING AND DEFENDING KUBERNETES, SCOTT PILGRIM STYLE
September 18-18, 2019
In this attack and defense demo webinar, Jay Beale, CTO of InGuardians, attacks a Scott Pilgrim-themed Kubernetes capture-the-flag scenario, then demonstrates how to break not only his attack but others unknown. Jay will start by compromising a program running in a container on the cluster, then con...

Simplifying Vendor Relationships with Cisco & IBM Security Solutions
SIMPLIFYING VENDOR RELATIONSHIPS WITH CISCO & IBM SECURITY SOLUTIONS
September 18-18, 2019
Cisco and IBM have heard some common security concerns across our joint customers worldwide. An overarching theme has focused on how to reduce product and vendor complexity while addressing a diverse set of threats. As part of our strategic alliance, we are delivering integrated solutions that addre...

The Making of Cyber Security Innovators: Orange Poland (Polska)
THE MAKING OF CYBER SECURITY INNOVATORS: ORANGE POLAND (POLSKA)
September 19-19, 2019
When is the last time you thought about the level of innovation in your cybersecurity defense? Well, SecBI is happy to present you with some field-proven methods to boost your innovation with significant results in threat detection and response in your network and/or your customers’ networks. ...

The Next Generation of Application Security
THE NEXT GENERATION OF APPLICATION SECURITY
September 23-23, 2019
Application security is an effective tool for defending against attacks. But as IT infrastructures shift to “software-defined everything” and move to the cloud, traditional appsec models no longer are enough to protect the application. This webinar takes a look at how companies are addre...

SPOTLIGHT

Join Enterprise Strategy Group (ESG) and Dtex Systems to get a detailed look at a newly released ESG Research Insights Report, "Insider Threat Program Realities." Based on the survey of 300 security and IT professionals in the US, the report underscores the continued struggle most organiza