home.aspx
 
.

Webinars

Automating Cybersecurity Functions in Your Enterprise: A Dark Reading Webcast
AUTOMATING CYBERSECURITY FUNCTIONS IN YOUR ENTERPRISE: A DARK READING WEBCAST
Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of o...

Anatomy of Container Attack Vectors and Mitigations
ANATOMY OF CONTAINER ATTACK VECTORS AND MITIGATIONS
Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing...

How to Remove Complexity as a Threat to Security
HOW TO REMOVE COMPLEXITY AS A THREAT TO SECURITY
No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in...

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019
UNDERSTANDING AND COMPLYING WITH RBI’S NEW EMAIL CYBERSECURITY GUIDELINES 2019
In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communicati...

Navigating the IT Security Certification Labyrinth
NAVIGATING THE IT SECURITY CERTIFICATION LABYRINTH
Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathw...

DEFEND, DETECT, AND REMEDIATE: A 360° VIEW OF CYBERSECURITY STRATEGIES
DEFEND, DETECT, AND REMEDIATE: A 360° VIEW OF CYBERSECURITY STRATEGIES
When it comes to securing information systems from breaches, the best medicine is a dose of prevention. In this complimentary webinar, panelists discuss top security threats and trends, business impacts, and the components of an effective, preventive cyber security program. The webinar addressed the...

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need
NOT SURE THAT YOU NEED OT CYBERSECURITY? A SENTRYO ASSESSMENT CAN QUICKLY PROVIDE THE DATA AND GUIDANCE THAT YOU NEED
You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communication...

Catch the Intruder in his Tracks - Advanced Threat Hunting
CATCH THE INTRUDER IN HIS TRACKS - ADVANCED THREAT HUNTING
The threat landscape has evolved significantly over the past twenty plus years, this webinar will highlight these changes and reveal how threats have advanced. The latest security paradigm for the endpoint detection and response will be brought to light and the implications for organisations debated...

Mobile IoT – Are you Cybersecurity Ready?
MOBILE IOT – ARE YOU CYBERSECURITY READY?
The Mobile IoT market is set for rapid growth over the coming years and providers are concentrating more on rapid widescale deployment with security often being a later consideration. This is not a tenable position as IoT applications can be mission critical and security needs to be at the forefront...

Cyber Ranges – The Future of Cybersecurity Training
CYBER RANGES – THE FUTURE OF CYBERSECURITY TRAINING
Clearly, people have become the weakest link in the cybersecurity organization. The shortage of cybersecurity professionals in India is estimated by one million open positions. The existing workforce lacks the skills to match the growing volume and complexity of today’s attacks. How can we ret...

Register for the Nautilus cyber-security webinar
REGISTER FOR THE NAUTILUS CYBER-SECURITY WEBINAR
Cyber-security is an increasing challenge for the shipping industry and Nautilus is stepping in to help members by co-hosting a special training webinar for seafarers in September. With high profile ransomware attacks on shipping companies such as Maersk and COSCO, operators are under pressure to im...

THE CYBERSECURITY CHALLENGE IN CEE - KEY REPORT FINDINGS
THE CYBERSECURITY CHALLENGE IN CEE - KEY REPORT FINDINGS
We will be hosting a live webinar on Monday 10 December 2018 at 4pm CET to discuss some of the key findings in the report. Moderated by John Malpas, Publishing Director at Legal Week, the panel will be joined by Andrea Simandy, European Data Protection Attorney at Microsoft, Dora Petranyi, CEE Manag...

Breaking the phishing line
BREAKING THE PHISHING LINE
It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish.  Why? Because it is fast, easy, and despite security training, users still click on attacks. This 20/20 webcast looks beyond user training at how technology can address the chal...

Practical Risk Management Steps for the Threat Hunter
PRACTICAL RISK MANAGEMENT STEPS FOR THE THREAT HUNTER
What is threat hunting and why is this field gaining popularity among security organizations? Threat hunting emphasizes on a proactive approach to security and encourages organizations to anticipate and manage potential security breaches and hacks. Join Dr. James Stanger, Sr Director of Products at ...

Ask the experts: What’s the worst web application security issue?
ASK THE EXPERTS: WHAT’S THE WORST WEB APPLICATION SECURITY ISSUE?
We know. It’s an impossible question to answer. There’s no such thing as a “worst web application security issue,” because every app and every organization has its own unique set of issues. But if you’re a development organization with limited resources, how do you know...

The Role of Human Error in Information Security
THE ROLE OF HUMAN ERROR IN INFORMATION SECURITY
It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on th...

Inside the Front Lines of Cyber Defense
INSIDE THE FRONT LINES OF CYBER DEFENSE
A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe.  Hear first-hand how our SOC team works tirelessly to thwart attackers — from the ana...

Introduction to Kubernetes Security
INTRODUCTION TO KUBERNETES SECURITY
Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer...

How to Fortify Your Organization’s Last Layer of Security – Your Employees
HOW TO FORTIFY YOUR ORGANIZATION’S LAST LAYER OF SECURITY – YOUR EMPLOYEES
Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat...

Extend your Attack Surface Coverage with No SIEM Required
EXTEND YOUR ATTACK SURFACE COVERAGE WITH NO SIEM REQUIRED
Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.

The Current State of Cybersecurity is a 24x7x365 Game
THE CURRENT STATE OF CYBERSECURITY IS A 24X7X365 GAME
The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if y...

Top 5 Cybersecurity Misconceptions
TOP 5 CYBERSECURITY MISCONCEPTIONS
Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud So...

Simulated Phishing and Awareness Training
SIMULATED PHISHING AND AWARENESS TRAINING
Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated...

Threat Detection for Common MITRE ATT&CK Techniques
THREAT DETECTION FOR COMMON MITRE ATT&CK TECHNIQUES
If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on t...

Aligning Security Solutions with MITRE ATT&CK
ALIGNING SECURITY SOLUTIONS WITH MITRE ATT&CK
The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian an...

How to Enforce Threat Intelligence at Your Perimeter
HOW TO ENFORCE THREAT INTELLIGENCE AT YOUR PERIMETER
Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable. So once you have that intelligence in hand, how do ...

The Latest on Ransomware
THE LATEST ON RANSOMWARE
Ransomware has wreaked havoc on many organizations, causing financial losses, reputation damage, temporary or permanent loss of sensitive or proprietary information, and the list goes on. And as if that isn’t enough, the actors behind this threat have constantly changed their tactics and who t...

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies
HOW TO OUTMATCH DATA SECURITY CHALLENGES WITH COST-EFFECTIVE, PRACTICAL STRATEGIES
Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential informat...

Through the Hacker’s Eyes: Detecting Attacks on Fully Patched Windows Machines
THROUGH THE HACKER’S EYES: DETECTING ATTACKS ON FULLY PATCHED WINDOWS MACHINES
To successfully stop hackers, you need to understand them; how their minds work, what their goals are, and which techniques they use to break through your defenses. In this special edition of QRadar’s Under the Radar technical demo series, NA Security Architect and QRadar expert Jose Bravo wil...

Turning the Tables on Cryptojacking
TURNING THE TABLES ON CRYPTOJACKING
It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and c...

Under the Radar – The Future of Undetected Malware
UNDER THE RADAR – THE FUTURE OF UNDETECTED MALWARE
The future is not full of easy to detect junkware, but hard to remediate and dangerous malware. Cybercriminals are becoming more sophisticated and adopting anti-forensic techniques that evade defenses with hard to remediate malware, like fileless attacks. Watch our webinar and learn about: The futur...

Ransomware & Powershell: The Power Couple
RANSOMWARE & POWERSHELL: THE POWER COUPLE
With more than 4,000 new ransomware samples appearing every day, it is impossible for signature-based defenses to keep up. Every indication shows that the rise in ransomware is accelerating, making it mission critical for you to put the right tools and processes in place to defend against these rele...

Comprehensive Breach Protection from Network to Endpoint
COMPREHENSIVE BREACH PROTECTION FROM NETWORK TO ENDPOINT
The number of threats that can impact an organization is far greater than the number to which most analysts can manually respond. This problem is amplified by the sheer volume of alerts generated by existing tools, and the difficult task of prioritizing each one. By the time a threat is detected, in...

If Cybersecurity Professionals were represented by an Emoji, which one would we be?
IF CYBERSECURITY PROFESSIONALS WERE REPRESENTED BY AN EMOJI, WHICH ONE WOULD WE BE?
Two seasoned cybersecurity professionals will discuss the breadth of cybersecurity in today's financial institutions, how this critical defence function operates, and what attributes a cybersecurity professional might need, to be successful in this field. They will also explore some of the recen...

The Power of AI to Disrupt Security Ops
THE POWER OF AI TO DISRUPT SECURITY OPS
Many of today's companies are hesitant to adopt new security technologies - particularly AI. The truth is AI is successfully disrupting many areas of security operations and shifting us away from the traditional SOC and man-led threat intelligence. In this webinar, Chris Calvert will introduce t...

The Cyber Protection Advantage: How MSPs Can Differentiate and Grow
THE CYBER PROTECTION ADVANTAGE: HOW MSPS CAN DIFFERENTIATE AND GROW
As the threat landscape continues to evolve, data volumes continue to grow, and the way data is accessed changes, modern data protection requires a next-gen solution that goes beyond backup. With Acronis’ unique, integrated approach to data protection – cyber protection – MSPs can ...

Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic
WEALTH WIZARDS: THREAT DETECTION WITH AMAZON GUARDDUTY AND ALERT LOGIC
As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent futu...

Understanding the Attack Landscape - Your Best Defense in Today’s State of Cyber Security
UNDERSTANDING THE ATTACK LANDSCAPE - YOUR BEST DEFENSE IN TODAY’S STATE OF CYBER SECURITY
As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes. Fortunatel...

Ask an expert: How to start and advance your cybersecurity career
ASK AN EXPERT: HOW TO START AND ADVANCE YOUR CYBERSECURITY CAREER
Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and h...

Must-Have Enterprise Mobile Security RFP Section: Advanced, Purpose-Built Threat Detection
MUST-HAVE ENTERPRISE MOBILE SECURITY RFP SECTION: ADVANCED, PURPOSE-BUILT THREAT DETECTION
Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. Simply porting a security solution developed for a different platform over to mobile is inadequate and can leave your enterprise vulnerable. Effective enterprise mobile security requires a purpose-built solution that...

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
FINE-TUNING ICS THREAT MODELS TO PRIORITIZE MITIGATIONS OF THE MOST VULNERABLE DEVICES
Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process sa...

Emerging Threats, Hackers and Attackers: Stories from the SOC
EMERGING THREATS, HACKERS AND ATTACKERS: STORIES FROM THE SOC
Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game. Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cybers...

Managing Threat Detection and Response for Securing AWS
MANAGING THREAT DETECTION AND RESPONSE FOR SECURING AWS
Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporat...

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity
ANOTHER BUCKET BITES THE DUST... SIMPLIFYING AWS CYBERSECURITY
With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your ...

This is Security: Nothing is what it SIEMs
THIS IS SECURITY: NOTHING IS WHAT IT SIEMS
Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. ...

Thinking Like a Cyber Attacker: Strategies for Defense
THINKING LIKE A CYBER ATTACKER: STRATEGIES FOR DEFENSE
Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking ke...

Becoming a Threat Hunter in Your Enterprise
BECOMING A THREAT HUNTER IN YOUR ENTERPRISE
For years, most IT security organizations have waited to detect new threats and  then moved swiftly to defend against them. Today, however, there is a new wave  of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats befor...

Deploying Secure Modern Apps in Evolving Infrastructures
DEPLOYING SECURE MODERN APPS IN EVOLVING INFRASTRUCTURES
Software development is changing. It is now measured in days instead of months. Microservice architectures are preferred over monolithic centralized app architecture, and cloud is the preferred environment over hardware that must be owned and maintained. In this webinar, we examine how these new sof...

Why IT Security and Project Mgmt. Training Will Be Key in 2017
WHY IT SECURITY AND PROJECT MGMT. TRAINING WILL BE KEY IN 2017
During this webcast, RedVector Senior Director of Product Management Bobby Person outlines the reasons why organizations must protect data and streamline projects, and provides training strategies to get started. Discover how your project managers, IT developers, software engineers and others can ma...

Overcoming Unstructured Data Security and Privacy Choke Points
OVERCOMING UNSTRUCTURED DATA SECURITY AND PRIVACY CHOKE POINTS
Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives ...

To Protect and Secure: Selling Cybersecurity as a Service
TO PROTECT AND SECURE: SELLING CYBERSECURITY AS A SERVICE
A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and cyberthreats like ransomware can help you successfully deliver security as a service to your clients. Auvik AVP of product management Patrick Albert talks with Tay...

Cybersecurity in a Cloud-Based World
CYBERSECURITY IN A CLOUD-BASED WORLD
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure...

Breach Detection: Why SPOTTING a Breach is More Important than STOPPING it
BREACH DETECTION: WHY SPOTTING A BREACH IS MORE IMPORTANT THAN STOPPING IT
In the current threat landscape, most businesses now recognise that it is only a matter of time before they are breached.  This shift in philosophy from the idea of preventing every intrusion to realising that intrusions will happen is an important milestone. Sadly, hackers can hide in your net...

How Zero Trust can help protect financial services networks
HOW ZERO TRUST CAN HELP PROTECT FINANCIAL SERVICES NETWORKS
Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistic...

Attack Tactics 6! Return of the Blue Team
ATTACK TACTICS 6! RETURN OF THE BLUE TEAM
In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, du...

Tracking attackers. Why attribution matters and how to do it
TRACKING ATTACKERS. WHY ATTRIBUTION MATTERS AND HOW TO DO IT
In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this ...

Attack Tactics 5 – Zero to Hero Attack
ATTACK TACTICS 5 – ZERO TO HERO ATTACK
Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Spray...

Intelligent API Cybersecurity, Is Your Agency Protected?
INTELLIGENT API CYBERSECURITY, IS YOUR AGENCY PROTECTED?
As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an...

How memcached reflection threatens IT security
HOW MEMCACHED REFLECTION THREATENS IT SECURITY
2018 is the year of high volume DDoS attacks. Since the emergence of the new attack vector memcached reflection in February, new bandwidth records have been set. Companies worldwide suddenly found themselves exposed to a new DDoS risk. In a webinar, the Link11 IT security experts Karsten Desler and ...

Bug Bounties and How They Help
BUG BOUNTIES AND HOW THEY HELP
Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cov...

Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps
SECURITY BY DESIGN—FULL LIFE CYCLE CONTAINER SECURITY THAT MATCHES THE SPEED OF DEVOPS
Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you...

Building Blocks for Your IT Security Program
BUILDING BLOCKS FOR YOUR IT SECURITY PROGRAM
Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and pri...

Threat Hunting Reimagined
THREAT HUNTING REIMAGINED
Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and...

THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS
THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS
Traditional antivirus solutions require a list of virus definitions - or "signatures" to detect known viruses and malware. But with nearly 1 million new malware threats released - every day, it is no wonder traditional antivirus can no longer cope. Learn the difference between traditional ...

Active Directory Best Practices to Frustrate Attackers
ACTIVE DIRECTORY BEST PRACTICES TO FRUSTRATE ATTACKERS
Active Directory out of the box defaults aren’t enough to keep your network safe.  Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard.  But it’s not hard to make things easy. Spin that how yo...

Sacred Cash Cow Tipping 2019
SACRED CASH COW TIPPING 2019
Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcas...

Highly Caffeinated InfoSec
HIGHLY CAFFEINATED INFOSEC
Whether you are brand new to InfoSec or a skilled veteran there are ways to push the limits and learn more about this exciting profession. Knowledge doesn’t always come from a classroom but instead can come from networking with other cybersecurity individuals and finding ways to hack anything ...

Endpoint Security Got You Down? No PowerShell? No Problem
ENDPOINT SECURITY GOT YOU DOWN? NO POWERSHELL? NO PROBLEM
Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter).  Turns out, by harnessing the powah of C# a...

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills
PRESIDENTIAL EXECUTIVE ORDER ON AMERICA’S CYBERSECURITY WORKFORCE - ENHANCING WORKFORCE MOBILITY AND SUPPORTING THE DEVELOPMENT OF CYBERSECURITY SKILLS
On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life.  The executive order further recognized the need to enhance workforce mobility to i...

Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures
ACHIEVING IMPROVED CYBERSECURITY POSTURE ACROSS IT & OT INFRASTRUCTURES
Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to autom...

What
WHAT'S YOUR DNS SECURITY RISK? INSIGHTS FROM RECENT PONEMON SURVEY
Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides i...

Threat Hunting—A Practical Demonstration
THREAT HUNTING—A PRACTICAL DEMONSTRATION
Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats...

After updatein The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk
AFTER UPDATEIN THE EXPANDING ATTACK SURFACE: 5 TIPS TO MANAGE THIRD-PARTY RISK
As organizations increase their reliance on third-party vendors for outsourced solutions, they expand their attack surface. Today’s digital environment offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organiza...

Key Steps to Identify Risk & Master Vendor Risk Management
KEY STEPS TO IDENTIFY RISK & MASTER VENDOR RISK MANAGEMENT
In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and ac...

Leveraging Analytics for More Effective Security Performance
LEVERAGING ANALYTICS FOR MORE EFFECTIVE SECURITY PERFORMANCE
More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off — and how can you determine that you are investing the appropriate amount of security spending in ...

Managing the Insider Threat—Why Visibility Is Critical
MANAGING THE INSIDER THREAT—WHY VISIBILITY IS CRITICAL
Only with full visibility into employee or third-party activity across a company network can even the earliest indicators of an insider threat be detected. By monitoring both user and file activity, security and compliance professionals can be alerted to risky, out-of-policy activities and any unexp...

Investigating the Hacker Lifecycle
INVESTIGATING THE HACKER LIFECYCLE
One of the hottest topics at RSA San Francisco 2019 was the Mitre ATT&CK framework. Along with the Lockheed-Martin Kill Chain, it has become a standard reference model for cybersecurity professionals. Specifically, it is used to describe each stage of an attack. Pen testers, security analysts an...

How to Establish Visibility, Governance and a Security Culture for Multi-Cloud
HOW TO ESTABLISH VISIBILITY, GOVERNANCE AND A SECURITY CULTURE FOR MULTI-CLOUD
Is cloud security your top priority, or it is languishing somewhere on a never-ending to do list? A user-driven cloud revolution has left IT and security professionals struggling to establish visibility of data and services, and unable to regain control of the risks associated with dispersed data an...

How DNS-Based Attacks Operate from the Inside Out, and How to Defend Against Them
HOW DNS-BASED ATTACKS OPERATE FROM THE INSIDE OUT, AND HOW TO DEFEND AGAINST THEM
The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyber-attacks as DNS is involved in more than 90% of malware/ransomware and nearly half of all data exfiltration incidents. So how exactly how do cyber-criminals use DN...

Winning the Zero Trust Race with Micro-Segmentation
WINNING THE ZERO TRUST RACE WITH MICRO-SEGMENTATION
In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data. Originally conceived in 2010, the zero trust security concept has recently gained new ground and is now seen as a vital element of enterprise information se...

HIPAA Compliance – Are You Staying Healthy?
HIPAA COMPLIANCE – ARE YOU STAYING HEALTHY?
The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*. But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement HIPAA security controls to comply with HIPAA regul...

SANS Top New Attacks and Threat Report
SANS TOP NEW ATTACKS AND THREAT REPORT
Each year, the annual RSA Conference in San Francisco features top SANS instructors presenting their look at the new attack techniques currently in use and their projections for future exploits. This fast-paced panel--moderated by Alan Paller and featuring Heather Mahalik, Ed Skoudis and Johannes Ul...

The Future of Phishing: It’s all about your customers
THE FUTURE OF PHISHING: IT’S ALL ABOUT YOUR CUSTOMERS
While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most cu...

The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey
THE STATE OF CLOUD SECURITY: RESULTS OF THE SANS 2019 CLOUD SECURITY SURVEY
Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the...

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals
KALI LINUX OVERVIEW: TIPS, TRICKS AND TRAPS FOR CYBERSECURITY PROFESSIONALS
Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT J...

MCAFEE + CISCO THREAT RESPONSE COLLABORATION & INTEGRATION
MCAFEE + CISCO THREAT RESPONSE COLLABORATION & INTEGRATION
Today, organizations are faced with increasingly complex systems driven by McAfee + Cisco-Threat Response Webinar Blogdissolving enterprise boundaries, ubiquitous user data in the cloud and an increasing volume and sophistication of cyber attacks across multiple vectors.  Siloed cyber security ...

Cyber Threat Hunting: Identify and Hunt Down Intruders
CYBER THREAT HUNTING: IDENTIFY AND HUNT DOWN INTRUDERS
Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand we...

The Business Impact of Cyber Risk
THE BUSINESS IMPACT OF CYBER RISK
KPMG reports 68% of CEOs believe a cyberattack is a matter of when — not if. How is your organization preparing to mitigate cyber risk in the new year? Join David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations pro...

Getting started in digital forensics
GETTING STARTED IN DIGITAL FORENSICS
Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar...

HOW CAN YOU DEFEND YOURSELF IF YOU DON
HOW CAN YOU DEFEND YOURSELF IF YOU DON'T KNOW WHAT'S ON THE HORIZON?
SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer info...

Improve Security, Privacy and Compliance with Continuous Oversight
IMPROVE SECURITY, PRIVACY AND COMPLIANCE WITH CONTINUOUS OVERSIGHT
The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned ...

Attack Surface Detector
ATTACK SURFACE DETECTOR
Penetration testers can only assess the attack surface they can see. Attack Surface Detector is a set of open source tools that can identify web application attack surface through static code analysis, making the data easy to leverage in dynamic testing. Penetration testers can also highlight differ...

Five Phases of Ethical Hacking
FIVE PHASES OF ETHICAL HACKING
GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking ...

Machine Learning in Cybersecurity
MACHINE LEARNING IN CYBERSECURITY
Machine Learning in cybersecurity webinar presented by Sanja Nedic. THIS WEBINAR COVERED. Core concepts behind machine learning and main types of problems it can solve. Examples of real-world uses of machine learning in security to augment or replace rule-based or heuristic solutions to problems suc...

Understanding privacy regulations and compliance
UNDERSTANDING PRIVACY REGULATIONS AND COMPLIANCE
Data is among an organization’s most valuable assets. Its management and protection should be viewed as a mission-critical stewardship rather than mere compliance. Larger and more costly cybersecurity incidents coincide with annually increasing regulatory and liability pressures. Looming U.S. ...

Everyone Loves Donuts, Especially Hackers
EVERYONE LOVES DONUTS, ESPECIALLY HACKERS
Donuts are just one of many ruses X-Force Red has up its sleeve. Tune into X-Force Red’s webinar on January 29 at 11am ET, to hear more real hacker stories. Find out how X-Force Red hackers have broken into companies worldwide, which tricks have worked and not worked, tools they have used, and...

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations
LEARN THE SECURITY AND PRIVACY BEST PRACTICES TO MANAGE THE NEW CALIFORNIA PRIVACY REGULATIONS
Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it.  Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the ho...

API Security - Unlock the Secrets
API SECURITY - UNLOCK THE SECRETS
The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock ...

Are you Ready to Demystify the Dark Web with IBM IRIS?
ARE YOU READY TO DEMYSTIFY THE DARK WEB WITH IBM IRIS?
Dark web forums and marketplaces can be treasure troves of data on threat actor activities, motivations, and capabilities. Often organizations desiring to obtain this valuable information attempt to conduct their own dark web research.  However, what they usually learn too late is that setting ...

How to Remain Secure, Protect Data, and Stay Compliant in the Face of End of Life Operating Systems
HOW TO REMAIN SECURE, PROTECT DATA, AND STAY COMPLIANT IN THE FACE OF END OF LIFE OPERATING SYSTEMS
The ever-changing threat landscape continues to challenge businesses who attempt to protect critical data, improve security posture, and remain compliant. That challenge is intensified when adding the constant risk of operating systems going end of life and pushing endpoints out of compliance agains...

Building Blocks for Your 2019 IT Security Program
BUILDING BLOCKS FOR YOUR 2019 IT SECURITY PROGRAM
Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

Transform Security and Risk Into a Business Function: A Panel Discussion
TRANSFORM SECURITY AND RISK INTO A BUSINESS FUNCTION: A PANEL DISCUSSION
As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape a...

BlackBerry Cylance 2019 Threat Report Highlights
BLACKBERRY CYLANCE 2019 THREAT REPORT HIGHLIGHTS
The BlackBerry Cylance 2019 Threat Report Highlights webinar is an opportunity to examine our conclusions with the researchers and analysts who authored the report. Join us for an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts wi...

Mitigate Identity-Related Breaches in the Era of Digital Transformation
MITIGATE IDENTITY-RELATED BREACHES IN THE ERA OF DIGITAL TRANSFORMATION
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks....

10 Incredible ways you can be hacked through email and how to stop the bad guys
10 INCREDIBLE WAYS YOU CAN BE HACKED THROUGH EMAIL AND HOW TO STOP THE BAD GUYS
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of ex...

Key Trends in Payments Intelligence - Machine Learning for Fraud Prevention
KEY TRENDS IN PAYMENTS INTELLIGENCE - MACHINE LEARNING FOR FRAUD PREVENTION
Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for ...

The Path Forward for Cybersecurity
THE PATH FORWARD FOR CYBERSECURITY'S AI: NOT ALL AI ARE CREATED EQUAL
For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of t...

Cryptocurrency Fraud and Blockchain Forensic Analysis
CRYPTOCURRENCY FRAUD AND BLOCKCHAIN FORENSIC ANALYSIS
When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss: Cryptocurrency f...

CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud
CIO ON DATA PRIVACY AND SECURING SENSITIVE INFORMATION SHARED IN THE CLOUD
As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize...

The Future of Adaptive Authentication in Financial Services
THE FUTURE OF ADAPTIVE AUTHENTICATION IN FINANCIAL SERVICES
The number of cyberattacks on financial institutions (FIs) cannot be overstated. In the past year, there have been more than one billion cyberattacks on financial institutions. That is three hundred times more than any other industry, such as retail, insurance, or healthcare. At an average cost of $...

Healthcare
HEALTHCARE'S NEED FOR SHIFTING SECURITY PRIORITIES FROM PREVENTION TO DETECTION
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control...

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control
THE PESKY PASSWORD PROBLEM: HOW HACKERS AND DEFENDERS BATTLE FOR YOUR NETWORK CONTROL
What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy an...

11 Ways to Defeat Two-Factor Authentication
11 WAYS TO DEFEAT TWO-FACTOR AUTHENTICATION
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years exp...

That Was Close! Tales of Near-Miss Mobile Attacks
THAT WAS CLOSE! TALES OF NEAR-MISS MOBILE ATTACKS
100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-...

Key Insights Into Today
KEY INSIGHTS INTO TODAY'S RISK MANAGEMENT LANDSCAPE
Today, cyber risk management affects organizations of all sizes across all industries. With data breaches on the rise and sensitive client information increasingly at risk, businesses need to elevate their existing risk management strategies to become more comprehensive. To proactively mitigate risk...

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices
TOP 5 REASONS HACKERS WANT YOUR EMPLOYEES’ MOBILE DEVICES
While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile dev...

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints
ENTERPRISE PHISHING ATTACKS & THE NEED TO DEFEND MOBILE ENDPOINTS
The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority...

Zimperium & IBM MaaS360
ZIMPERIUM & IBM MAAS360
Zimperium has integrated IBM MaaS360 into zConsole, the administrative console that supports our award-winning mobile threat defense (MTD) solution, zIPS. With “Zimperium for MaaS360,” MaaS360 owners can now detect mobile risks and threats with Zimperium, and then set compliance and reme...

Using AI/Machine Learning in Cybersecurity
USING AI/MACHINE LEARNING IN CYBERSECURITY
AI and machine learning have proven to be valuable technologies when it comes to detecting threats at time zero and across various vectors.  But there is a time and place for its usage. Join me during my monthly threat webinar and live Q&A session to learn: How you can help improve your abi...

Forrester-Led Webinar: Connecting the Relationship Between Threat Intelligence and Adversary
FORRESTER-LED WEBINAR: CONNECTING THE RELATIONSHIP BETWEEN THREAT INTELLIGENCE AND ADVERSARY
Join Forrester Analyst Rick Holland and ThreatConnect Chief Intelligence Officer Rich Barger for a webinar on understanding your adversary and the importance of proper threat intelligence analysis to proactively defend your organization

Operationalizing Threat Intelligence to Battle Persistent Actors
OPERATIONALIZING THREAT INTELLIGENCE TO BATTLE PERSISTENT ACTORS
Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation ...

How to Prioritize and Protect Against Relevant Threats: Context is the Key
HOW TO PRIORITIZE AND PROTECT AGAINST RELEVANT THREATS: CONTEXT IS THE KEY
Joint webinar featuring ThreatConnect and FireEye iSight Intelligence: “How to Prioritize and Protect Against Relevant Threats: Context is Key”. The webinar covers how to prioritize your team’s response and put your intelligence to use.

Security Weekly Webinar: Cyber Threat Intelligence – How to Do It Wrong
SECURITY WEEKLY WEBINAR: CYBER THREAT INTELLIGENCE – HOW TO DO IT WRONG
Tune in to watch Security Weekly’s Paul Asadoorian and John Strand discuss threat intelligence with Jason Cohen, Threat Intelligence Research Engineer at ThreatConnect. Learn about the shortcomings and misuses of threat intelligence to better understand how it can be used effectively and bring...

Critical Actions to Survive a Data Breach in 2019 & Beyond
CRITICAL ACTIONS TO SURVIVE A DATA BREACH IN 2019 & BEYOND
Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, fro...

Cybersecurity Ratings Part 3: The Third Way
CYBERSECURITY RATINGS PART 3: THE THIRD WAY
Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assu...

How Malware Affects Your Security Rating & What to Do About It
HOW MALWARE AFFECTS YOUR SECURITY RATING & WHAT TO DO ABOUT IT
Learn how botnet infections can impact your security posture. Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organization, affecting its reputation, brand value and customer loyalty. Security ratings are impacted by these, giving an indep...

What Makes a Security Rating? Deep Dive Into Threat Data Feeds
WHAT MAKES A SECURITY RATING? DEEP DIVE INTO THREAT DATA FEEDS
Learn how threat data fits into security ratings. Cyber attacks and data breaches are a regular challenge for organizations and their cybersecurity practitioners today. The consequences for a company that falls victim to a hacking attack or other form of data breach can be significant, incurring bot...

Cybersecurity: Prime and Subcontractor Responsibilities
CYBERSECURITY: PRIME AND SUBCONTRACTOR RESPONSIBILITIES
It’s no longer a question of if your cybersecurity will be compromised, but when. Government contractors—both prime contractors and their subcontractors—must understand the federal cybersecurity landscape to ensure compliance with its numerous (and sometimes confusing) requirements...

IFAC TAG Webinar on Cyber Security
IFAC TAG WEBINAR ON CYBER SECURITY
In today’s digital age, many people have at some point wondered whether their online accounts have been compromised or have been part of a large data breach. Like a lot of the issues that make the news on a regular basis, we can become desensitized to cyber risks, but it is imperative, especia...

Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack
PLAYBOOK FOR DEFENDING YOUR NETWORK AND REDUCING THE RISK OF A CYBERATTACK
When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT bec...

Bridging the gap between on-prem and AWS security
BRIDGING THE GAP BETWEEN ON-PREM AND AWS SECURITY
As more organizations use a combination of their on-premises network and Amazon Web Services (AWS) to deliver services and applications, they are struggling to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy these requirements in an efficient, cloud-nati...

Live Broadcast: Be Empowered to Threat Hunt in 2019
LIVE BROADCAST: BE EMPOWERED TO THREAT HUNT IN 2019
New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is...

Benchmarks for Corporate Cybersecurity
BENCHMARKS FOR CORPORATE CYBERSECURITY
This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations ...

ATT&CK Deep Dive: Lateral Movement
ATT&CK DEEP DIVE: LATERAL MOVEMENT
Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your...

Adopting a Purpose-Built Approach to Linux Security
ADOPTING A PURPOSE-BUILT APPROACH TO LINUX SECURITY
Cloud is the dominant computing trend of our time, and Linux is the power behind it. As enterprises continue to adopt more cloud native infrastructure, we see accelerated adoption of Linux in the form of both migrations of existing infrastructure and greenfield application deployment. Unfortunately ...

Global Threat Report: The Year of the Next-Gen Cyberattack
GLOBAL THREAT REPORT: THE YEAR OF THE NEXT-GEN CYBERATTACK
2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever a...

Advanced Threat Hunting & Incident Response with CB ThreatHunter
ADVANCED THREAT HUNTING & INCIDENT RESPONSE WITH CB THREATHUNTER
Enterprise security teams struggle to get their hands on the endpoint data they need to investigate and proactively hunt for abnormal behavior. Security and IT professionals currently lack the ability to see beyond suspicious activity and need a way to dive deeper into the data to make their own jud...

5 steps every charity should take to improve their cyber security
5 STEPS EVERY CHARITY SHOULD TAKE TO IMPROVE THEIR CYBER SECURITY
On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their orga...

Security Industry Financials – A Closer Look
SECURITY INDUSTRY FINANCIALS – A CLOSER LOOK
Equities performed exceptionally well in 2017 on the back of strong corporate earnings, lax monetary policy, and the passing of major tax reforms. Notwithstanding the strength seen for a majority of the year, 2018 has been off to a rocky start, with volatility seen in both the debt and equity market...

Cybersecurity: Bridging the Gap Between Physical Security and IT / IoT
CYBERSECURITY: BRIDGING THE GAP BETWEEN PHYSICAL SECURITY AND IT / IOT
On Monday, Dec. 11, as part of the SIA Webinar series, a webinar titled Cybersecurity: Bridging the Gap between Physical Security and IT/IoT covered best practices from edge to core hardening, bridging cyberprotection techniques, and technologies that help unify disparate technologies into a common ...

Incident Response Masterclass: Investigate a Rogue Insider with Varonis
INCIDENT RESPONSE MASTERCLASS: INVESTIGATE A ROGUE INSIDER WITH VARONIS
Join our IR team for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities. During this training session, our security analysts will execute a new attack scenario in our lab. An insider was paid to exfiltrate sensitive org...

Double Your Revenue with Backup and DRaaS
DOUBLE YOUR REVENUE WITH BACKUP AND DRAAS
The information age is upon us and your clients are grappling with how to effectively deal with the data explosion.  They need help in efficiently backing up critical data and ensuring they can quickly recover from disasters whether they be natural or inflicted by humans. Elite IT Solution and ...

Social media and email phishing: How to protect financial information from fraudsters
SOCIAL MEDIA AND EMAIL PHISHING: HOW TO PROTECT FINANCIAL INFORMATION FROM FRAUDSTERS
Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Bri...

Draft and Develop: A Solution to the Cyber Security Skills Shortage
DRAFT AND DEVELOP: A SOLUTION TO THE CYBER SECURITY SKILLS SHORTAGE
By 2019, the nonprofit group ISACA predicts a global shortage of two million cyber security professionals. Security can no longer work in a silo-- they now need to communicate across the business and balance the needs of multiple stakeholders from product line managers to ops teams. Outreach’s...

NIST Recommendations for ICS & IIoT Security
NIST RECOMMENDATIONS FOR ICS & IIOT SECURITY
WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency...

ATTACK SIMULATION
ATTACK SIMULATION
This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology.  We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the ...

Best Practices for Assessing Cyber Vulnerabilities
BEST PRACTICES FOR ASSESSING CYBER VULNERABILITIES
Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimated nearly 19,000 new vulnerabilities would be disclosed. There are just too many to discover, assess and effectively mitigate. Reducing vulnerability overload means focusing like a laser on vulnerabilities...

Financing Security: How M&As and the Markets Are Shaping the Security Industry
FINANCING SECURITY: HOW M&AS AND THE MARKETS ARE SHAPING THE SECURITY INDUSTRY
Attend the unique SIA webinar “Financing Security: How M&As and the Markets Are Shaping the Security Industry” to learn more about the impact of the 2018 deals that brought together Amazon and Ring, ADT and Red Hawk, Motorola and Avigilon, Securitas and Kratos, and many others. In ad...

Ponemon Survey Report: Measuring & Managing the Cyber Risks to Business Operations
PONEMON SURVEY REPORT: MEASURING & MANAGING THE CYBER RISKS TO BUSINESS OPERATIONS
How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.

Overcoming the Challenges of Credentialed Scanning
OVERCOMING THE CHALLENGES OF CREDENTIALED SCANNING
Get the visibility you need to build an effective cyber exposure plan. You know authenticated or credentialed scanning provides more detail about your existing assets, along with the deepest possible understanding of the exposures in your environment. So why aren’t you taking more advantage of...

BSI and Proofpoint: State of the Phish Webinar
BSI AND PROOFPOINT: STATE OF THE PHISH WEBINAR
Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data relat...

CyberSecurity CopyPortfolio Webinar
CYBERSECURITY COPYPORTFOLIO WEBINAR
2018 was the year big tech & govt’s struggled with CyberSecurity breaches - Cyber is now an investment trend. Watch eToro's webinar with International Broadcaster, Elliott Gotkine & eToro’s CEO, Yoni Assia as they discuss cyber security.

Why Use a Cloud Managed Service Provider?
WHY USE A CLOUD MANAGED SERVICE PROVIDER?
If you’re about to embark on your cloud journey, the first decision you will need to make is whether to undertake the project in-house or outsource it to a Managed Service Provider (MSP). To help you make this important decision, we’ve recorded a free on-demand webinar. In twenty minutes...

 The evolving cyber security threat: Introduction to Cryptomining
THE EVOLVING CYBER SECURITY THREAT: INTRODUCTION TO CRYPTOMINING
Webinar: The evolving cyber security threat: Introduction to Cryptomining. In this webinar we explore the current threat landscape affecting industry technology and how we recommend and can assist you in guarding against it.

2019 Vulnerability Management Predictions
2019 VULNERABILITY MANAGEMENT PREDICTIONS
Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management,  discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this w...

The Role of Threat Intelligence in Cyber Resilience
THE ROLE OF THREAT INTELLIGENCE IN CYBER RESILIENCE
When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization? Most organizations don't even know when security controls have failed. This is a primary reason why intrusions exist in organizations for upwar...

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)
SIX INCONVENIENT TRUTHS ABOUT DATA-CENTRIC SECURITY (AND WHAT TO DO ABOUT THEM)
Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data res...

Securing Organizations from Remote Desktop Protocol Exploits
SECURING ORGANIZATIONS FROM REMOTE DESKTOP PROTOCOL EXPLOITS
Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the...

Stopping Email-Borne Threats Before They Spread
STOPPING EMAIL-BORNE THREATS BEFORE THEY SPREAD
Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the...

Privileged Password Management 101: Laying the Foundation for Success
PRIVILEGED PASSWORD MANAGEMENT 101: LAYING THE FOUNDATION FOR SUCCESS
InfoSec pros have their work cut out for them—with the need to secure an estimated 300 billion passwords by 2020. Privileged password management, in particular, is a pain point for almost every organization. Privileged credentials are often difficult to identify, challenging to tame and proper...

Protecting against Advanced Email Threats: Beyond the Nigerian Prince Scam
PROTECTING AGAINST ADVANCED EMAIL THREATS: BEYOND THE NIGERIAN PRINCE SCAM
In this webinar, GreatHorn CEO Kevin O’Brien discussed how phishing attacks have evolved – from the early days of the widespread Nigerian prince schemes to today’s sophisticated and highly targeted spear phishing threats – and how our collective response has failed to keep up...

Solving New Authentication Challenges While Finding Parity Between User Experience and Security
SOLVING NEW AUTHENTICATION CHALLENGES WHILE FINDING PARITY BETWEEN USER EXPERIENCE AND SECURITY
Unfortunately, most businesses are making the fundamental mistake when it comes to authentication and are thinking inside-out, but by thinking outside-in, they would automatically put the Customer first. Until now, strong (and not so strong) authentication to services seems to have been driven by an...

Is GDPR Working? Lessons from Data & the Field
IS GDPR WORKING? LESSONS FROM DATA & THE FIELD
Find out what data tells us about the effectiveness of GDPR. After years of debate over whether to impose new cybersecurity regulations on companies, the General Data Protection Regulation (GDPR) went into effect in Europe in May 2018. Already we’re seeing data breach victims ordered to pay fi...

IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
IDAAS: YOUR IDENTITY FABRIC. CONNECTING EVERY USER TO EVERY SERVICE, SEAMLESSLY
Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for fede...

Understand and Protect the Modern Attack Surface
UNDERSTAND AND PROTECT THE MODERN ATTACK SURFACE
Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discu...

The Key Privileged Access and Security Implications of Granting Third-Party Vendor Access
THE KEY PRIVILEGED ACCESS AND SECURITY IMPLICATIONS OF GRANTING THIRD-PARTY VENDOR ACCESS
Several different remote access solutions are built into Microsoft Windows to extend third-party vendors access to your systems. In this webinar, Windows and IT security expert Russell Smith weighs in on the pros and cons of using virtual private networks (VPNs), Workplace Join, Remote Desktop Servi...

After the Data Breach: Stolen Credentials
AFTER THE DATA BREACH: STOLEN CREDENTIALS
When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However,...

Your Resolution for 2018: Five Principles For Securing DevOps
YOUR RESOLUTION FOR 2018: FIVE PRINCIPLES FOR SECURING DEVOPS
Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and appl...

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit
NOT ALL FLAWS ARE CREATED EQUAL: THE DIFFERENCE BETWEEN A FLAW, A VULNERABILITY AND AN EXPLOIT
According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploit...

RSA 2018 - What’s Hot in the Cyber Security Space
RSA 2018 - WHAT’S HOT IN THE CYBER SECURITY SPACE
Love it or hate, the annual RSA Conference (RSAC) in San Francisco is the largest cyber security conference in world. It is where the world comes to talk and learn security. Inevitably every year at RSAC there are some technologies that become the industry buzzwords and hot buttons. These generally ...

Demystifying AI for Cyber Security
DEMYSTIFYING AI FOR CYBER SECURITY
From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI...

2018 Threat Report and Top Malware
2018 THREAT REPORT AND TOP MALWARE
If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emergin...

California Consumer Privacy Act: Are You Prepared for 2020?
CALIFORNIA CONSUMER PRIVACY ACT: ARE YOU PREPARED FOR 2020?
The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to ha...

Overcoming Cloud & Security Challenges
OVERCOMING CLOUD & SECURITY CHALLENGES
74% of Healthcare organizations report leveraging the Cloud to achieve financial savings and operational efficiencies. However, recent findings show over 60% of these organizations are experiencing Cloud adoption challenges and Security anxiety. It is essential for Healthcare organizations to overco...

Cyber Value-at-Risk Webinar
CYBER VALUE-AT-RISK WEBINAR
Cyber Value-at-risk (VAR) offers a revolutionary industry approach helping Enterprises with effective cyber management and vulnerability remediation prioritization. Simply classifying risks in broad terms such as “high”, “medium” or “low” does not tell you a busin...

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention
PALO ALTO NETWORKS & CYBERX INTEGRATION: ACCELERATING THE TIME BETWEEN ICS/SCADA THREAT DETECTION AND PREVENTION
This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Securit...

Computational Thinking and Skills: A Foundation for STEM and Cybersecurity Education
COMPUTATIONAL THINKING AND SKILLS: A FOUNDATION FOR STEM AND CYBERSECURITY EDUCATION
Success in multiple industry sectors or any of the hundreds of new tech-heavy jobs emerging in the modern economy requires a core competency: computational thinking and skills. Computational thinking and skills extend beyond computer programming to include a larger set of knowledge and skills broadl...

How To Create a Successful Cyber-Security Policy
HOW TO CREATE A SUCCESSFUL CYBER-SECURITY POLICY
As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security po...

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist
PRIVATE EQUITY CYBERSECURITY: PRELIMINARY LOOK AT EXCLUSIVE COMPLIANCE CHECKLIST
Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all web...

3 Flaws with the Defense-in-Depth Security Model and How to Improve It
3 FLAWS WITH THE DEFENSE-IN-DEPTH SECURITY MODEL AND HOW TO IMPROVE IT
Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without ...

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense
YOUR NETWORK NEEDS TO BE THE FIRST AND LAST LINE IN YOUR CYBER-SECURITY DEFENSE
Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge.  In this webinar, we will take a look...

Approaching Cyber Security Vendor Selection in OT Environments
APPROACHING CYBER SECURITY VENDOR SELECTION IN OT ENVIRONMENTS
Operational Technology (OT) and ICS environments present unique challenges for the selection of security solutions. Join ARC Advisory Group Vice President of Research, Larry O’Brien as he shares his recommendations for cyber security vendor selection in the ICS and OT worlds.

What MSPs Need to Know to succeed in the Cloud Security Market
WHAT MSPS NEED TO KNOW TO SUCCEED IN THE CLOUD SECURITY MARKET
Cloud security is the number one skill and need required in the vast cloud market landscape.  The latest data in CompTIA’s 2018 cloud research shows that cloud has officially reached the mainstream. Here are some of the latest stats: 91% of enterprises and corporations are using cloud sol...

Why Security Is a Team Sport
WHY SECURITY IS A TEAM SPORT
Recently, U.S. Cert warned that global threat actors are actively targeting managed service providers. Clearly, MSPs are on the front line. We’re being asked to take on a more active security role than ever before. However, many MSPs lack the internal resources and skillsets to embrace a full-...

2018 Cybersecurity Headlines in Review
2018 CYBERSECURITY HEADLINES IN REVIEW
2018 was a particularly busy year for the cybersecurity industry… Beyond the exponential growth in the number and types of cyber-attacks—including Magecart, which compromised the payment processing systems for a number of large companies—hundreds of new cybersecurity startups were...

The Five Pillars of Data Governance 2.0 Success
THE FIVE PILLARS OF DATA GOVERNANCE 2.0 SUCCESS
What’s the state of data governance readiness within your organization? Do you have an executive sponsor? Is a standard definition understood across the enterprise? How does your IT team view it? How does your organization approach analytics, business intelligence and decision-making? Have you...

3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools
3 CHALLENGES OF THREAT HUNTING USING ENDPOINT DETECTION (EDR) TOOLS
In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and ...

New Ransomware Report: Learn how to protect your clients and expand your practice in 2019
NEW RANSOMWARE REPORT: LEARN HOW TO PROTECT YOUR CLIENTS AND EXPAND YOUR PRACTICE IN 2019
Ransomware attacks aren’t decreasing among small and midsize customers. According to Datto’s annual State of the Channel Ransomware Report, 79 percent of MSPs reported ransomware attacks against SMBs from Q2 2016 – Q2 2018. And in the first half of 2018 alone, 55 percent reported a...

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad
CYBER THREATS TO WATCH IN 2019: KEY TAKEAWAYS FROM OUR WEBINAR WITH THE FBI CYBER SQUAD
The fines coming from the E.U.’s General Data Protection Regulation (GDPR) legislation are going to be doled out throughout 2019, which also means there will be a lot more reporting of these breaches in mainstream media outlets. However, if companies are transparent with GDPR investigators the...

How Security Services Fuel Growth for MSPs
HOW SECURITY SERVICES FUEL GROWTH FOR MSPS
Faced with modern cyber threats, your clients’ security requirements are changing by the minute. To ensure the highest levels of service and security, MSPs like you need to understand, meet, and exceed those requirements—and you have to do it better than your competition can. Join this w...

Tackling Complexity: 3 Tips for Effective Endpoint Security
TACKLING COMPLEXITY: 3 TIPS FOR EFFECTIVE ENDPOINT SECURITY
Remote locations, limited bandwidth, and network connectivity issues complicate efforts to discover and report endpoint hygiene data. Inconsistent or manual patching often results in persistent, unidentified vulnerabilities and non-compliant endpoints. Use of multiple, non-integrated tools to gather...

State of the Internet Security Report
STATE OF THE INTERNET SECURITY REPORT
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the at...

Take Your Security With You From On-Premises to the AWS Cloud
TAKE YOUR SECURITY WITH YOU FROM ON-PREMISES TO THE AWS CLOUD
Find out all the benefits of using one security solution across your on-premises data center and AWS cloud workloads. Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to pr...

The rise of privacy: a risk-based approach to privacy oversight, compliance and management
THE RISE OF PRIVACY: A RISK-BASED APPROACH TO PRIVACY OVERSIGHT, COMPLIANCE AND MANAGEMENT
With GDPR in force and Google and Facebook facing massive lawsuits, organizations face mounting pressure to demonstrate they are safeguarding private information. Recent hearings on enacting U.S. privacy legislation and California’s privacy law only serve to heighten the need for organizations...

Managing cyber threats: Developing a sustainable cybersecurity program to address your unique risks
MANAGING CYBER THREATS: DEVELOPING A SUSTAINABLE CYBERSECURITY PROGRAM TO ADDRESS YOUR UNIQUE RISKS
Organizations face increasing risks and threats to their customer, financial, operations and other data, processes and systems. It is vital to achieve balance between the need to safeguard information, minimize disruption in case of an attack or breach, provide transparency and manage a sustainable ...

Lessons Learned from Recent Cyber Incidents: Google Plus, Facebook, Reddit, and What You Need to Know
LESSONS LEARNED FROM RECENT CYBER INCIDENTS: GOOGLE PLUS, FACEBOOK, REDDIT, AND WHAT YOU NEED TO KNOW
Join Raj Bakhru, Partner at ACA Aponix, on Tuesday, November 27 at 11:00am ET as he examines recent high-profile breaches involving Google Plus, Facebook, Reddit, British Air, and Colorado Timberline, and others. Raj will discuss what your firm can learn from these incidents, key protections you can...

HOW TO OVERCOME CHALLENGES IN SECURING MODERN CLOUD ENVIRONMENTS
HOW TO OVERCOME CHALLENGES IN SECURING MODERN CLOUD ENVIRONMENTS
As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about the security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies. Traditional security tools are ...

The Next Cyber Threat Is Already In Your Network
THE NEXT CYBER THREAT IS ALREADY IN YOUR NETWORK
While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is...

Using Open Source Libraries to Speed Development Whilst Minimising Risk
USING OPEN SOURCE LIBRARIES TO SPEED DEVELOPMENT WHILST MINIMISING RISK
Better, faster, cheaper. these are the promises of DevOps. The future of software development and operations is all about speeding up development and deployment, aided and abetted by cloud-based infrastructure, RESTful APIs and indeed, open source software. But then comes security, which requires a ...

Can We Protect Critical Infrastructure from Cyberattacks?
CAN WE PROTECT CRITICAL INFRASTRUCTURE FROM CYBERATTACKS?
Cyberattacks have sharply increased against critical infrastructure globally, impacting power plants, water treatment facilities, oil & gas refineries and many more. Attacks include StuxNet, HaveX, Industroyer, Black Energy, and Triton, all using advanced hacking techniques that attack memory to...

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk
WEBINAR ON THE SAFETY ACT AND CYBERSECURITY: PROTECTING YOUR REPUTATION AND REDUCING LIABILITY RISK
In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack. ...

Getting More From Less: 4 Ways Replacing AV with a Security Platform Can Help You
GETTING MORE FROM LESS: 4 WAYS REPLACING AV WITH A SECURITY PLATFORM CAN HELP YOU
The threat landscape is growing increasingly sophisticated and is bypassing traditional antivirus. To combat this IT and security professionals are adding products to their security stack. 48% of organizations are using more than 25 different discrete or point security tools to manage, investigate, ...

The Memory Attack Battleground
THE MEMORY ATTACK BATTLEGROUND
Recent cyberattacks have use sophisticated fileless techniques and target applications in process memory, making them largely invisible to conventional security products. WannaCry, Petya/NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to break into networks and s...

Can We Rein in the Global Cybersecurity Crisis?
CAN WE REIN IN THE GLOBAL CYBERSECURITY CRISIS?
The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated ...

Learning to Win: Making the Case for Autonomous Cyber Security Solutions
LEARNING TO WIN: MAKING THE CASE FOR AUTONOMOUS CYBER SECURITY SOLUTIONS
Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution is particularly relevant to cyber security, where machine learning is used to help human analysts make sense of increasingly large amounts of data to identify...

Operational Technology Risk Assessment
OPERATIONAL TECHNOLOGY RISK ASSESSMENT
Historically, an organization developed a Cybersecurity program to achieve compliance. It has been our experience, organizations which achieve full compliance cannot continue to operate because of strict Compliance requirements and the lack of a functional Cybersecurity program. The lack of a functi...

Protecting Our 9-1-1 Centers From Targeted Cyber Attacks
PROTECTING OUR 9-1-1 CENTERS FROM TARGETED CYBER ATTACKS
Over the last several months we have discussed a variety of attacks:  Ransomware, Cryptojacking, Advanced Persistent Threats, DDoS/TDoS and others. We’ve seen criminals and state actors use these techniques for targeted attacks against our public safety infrastructure. In this webinar, we...

HOW TO FIGHT SECURITY FATIGUE IN YOUR ENTERPRISE
HOW TO FIGHT SECURITY FATIGUE IN YOUR ENTERPRISE
Your most critical stakeholders are prone to security fatigue: the executive team (or board) and the co-workers that you’re tasked to protect. Your success is tied to your ability to establish and maintain credibility with your stakeholders while also protecting your business. How do you ensur...

Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
BEYOND S3 BUCKETS - EFFECTIVE COUNTERMEASURES FOR EMERGING CLOUD THREATS
Research shows that 25% of organizations have cryptojacking activity in their AWS, Azure, and GCP environments. Is yours one of them? While S3 buckets continue to dominate headlines, cryptojacking and other threats lay quietly behind the scenes. Learn about the latest cloud threats and arm yourself ...

Operationalizing Data For Fraud Investigations
OPERATIONALIZING DATA FOR FRAUD INVESTIGATIONS
Security and Fraud teams are swimming in data. Data is not the problem, but operationalizing and making use of the data we have is, especially when it comes to fraud prevention. Join Chip Witt, head of product at SpyCloud, and Security Boulevard Managing Editor Charlene O'Hanlon for a lively dis...

All Your Network Traffic Are Belong to Us – VPNFilter Malware and Implications for ICS
ALL YOUR NETWORK TRAFFIC ARE BELONG TO US – VPNFILTER MALWARE AND IMPLICATIONS FOR ICS
The world recently learned of new multi-stage router malware with destructive capabilities and the ability to intercept web traffic and insert malicious code into it. Described as “an impressive piece of work” by Bruce Schneier, the VPNFilter malware also includes a packet sniffer for ca...

The State of Open Source Vulnerabilities Management
THE STATE OF OPEN SOURCE VULNERABILITIES MANAGEMENT
The number of open source vulnerabilities hit an all-time record in 2017 with 3,500 reported vulnerabilities - that's 60% higher than the previous year, and the trend continues in 2018.  Since it’s impossible to keep up with today’s pace of software production without open sourc...

12 Ways to Defeat Two-Factor Authentication
12 WAYS TO DEFEAT TWO-FACTOR AUTHENTICATION
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years&rsq...

Embedding Security in a Modern DevOps Pipeline - A Customer
EMBEDDING SECURITY IN A MODERN DEVOPS PIPELINE - A CUSTOMER'S PERSPECTIVE
Embedding Security in a Modern DevOps Pipeline - A Customer's Perspective. Hear directly from a customer’s unique perspective on how Beeline (the world leader in contingent workforce solutions) aligned Development, Operations and Security practitioners to set up a fully automated CI/CD pip...

State of the Internet / Security Report: Latest DDoS and Web App Attack Trends Overview
STATE OF THE INTERNET / SECURITY REPORT: LATEST DDOS AND WEB APP ATTACK TRENDS OVERVIEW
As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks of up to 650 Gbps. Our security experts analyze ...

EVERYTHING I LEARNED & WANTED TO FORGET ABOUT WAFS
EVERYTHING I LEARNED & WANTED TO FORGET ABOUT WAFS
Application security is nothing like it was 25 years ago. Today, almost all enterprise applications have some web-facing component, whether in the form of a pure web-app, cloud application, API, or microservice. Furthermore, attackers have become more efficient, persistent and sophisticated, while a...

Mind the Security Gap: Moving Past Best Practices to Cutting Edge Cyber Security in Accounts Receivable
MIND THE SECURITY GAP: MOVING PAST BEST PRACTICES TO CUTTING EDGE CYBER SECURITY IN ACCOUNTS RECEIVABLE
Given the sensitivity of payment information and the increasing use of technology in accounts receivable, it is vital for businesses to prioritize cybersecurity and privacy. In this webcast you will learn how to: Evaluate your company's cybersecurity health. Secure financial data through cutting...

The Mobile Menace Most Wanted List
THE MOBILE MENACE MOST WANTED LIST
When it comes to mobile security, what you can’t see really can hurt you. In fact, there are seven mobile menaces creeping around your employees’ devices right now just waiting to pounce. And when they do, you better be prepared! This webinar will introduce you to the #1 on the Mobile Me...

Enforcing Immutability and Least Privilege to Secure Containerized Applications on OpenShift
ENFORCING IMMUTABILITY AND LEAST PRIVILEGE TO SECURE CONTAINERIZED APPLICATIONS ON OPENSHIFT
One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do. With immutability, every attempt t...

Fraud in the Travel Sector: Insights from Law Enforcement and Cyber Forensics
FRAUD IN THE TRAVEL SECTOR: INSIGHTS FROM LAW ENFORCEMENT AND CYBER FORENSICS
This webinar will walk you through: How fraudulent booking service advertisements are sold in the online underground forums. The methods criminal actors use to purchase compromised credit cards through various online marketplaces. How criminal networks rely on fraudulent booking services in their op...

Consumer awareness of cyber security in a hyper-connected home
CONSUMER AWARENESS OF CYBER SECURITY IN A HYPER-CONNECTED HOME
Incidents of attacks against smart-home devices are often featured in the media. But what is the consumer’s perception? And who is best positioned to deliver cyber-security services - traditional security vendors or the ISP? To find out, we surveyed 1250 consumers from 10 countries. Discover h...

Can a Corporate Network Get Hacked Via a Smartphone?
CAN A CORPORATE NETWORK GET HACKED VIA A SMARTPHONE?
“Super Company” (a company of about 2,000 employees) conducted a security test, with the help of a penetration (pen) tester, to find ways to steal confidential documents. Unsurprisingly, access to the company's internal network was gained starting from a smartphone. In this on-demand...

Protecting City Government Employees from Mobile Threats
PROTECTING CITY GOVERNMENT EMPLOYEES FROM MOBILE THREATS
Experts indicate that state and local governments are being increasingly targeted because their technology is often times more vulnerable than the private sector’s, they host highly valuable data and they have a limited ability to manage system down time. With limited resources, protecting gov...

HOW TO KEEP FAMILIES CYBER SAFE
HOW TO KEEP FAMILIES CYBER SAFE
In our on-demand webinar, Protecting Your Family’s Online Reputation: A Conversation About Child & Family Social Media Habits, we explore the results of surveys on child and family social media habits, just in time for National Cyber Security Awareness month. Our children are digital nativ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all delivered ...

Cyber security and the protection of assets
CYBER SECURITY AND THE PROTECTION OF ASSETS
With viewers consuming content on an increasing array of devices and platforms, and the media industry a high-profile target for hackers, the task of protecting assets can be complicated and costly.

Tools and Strategies for Better Cyber Defense
TOOLS AND STRATEGIES FOR BETTER CYBER DEFENSE
Protecting your organization from intensifying cyber threats and attacks requires full visibility into your IT environment and alignment among IT Ops and Security teams. This on-demand webinar presented by Online Business Systems and BMC presents tools and strategies to strengthen cybersecurity.

The Intersection of Cybersecurity and IoT
THE INTERSECTION OF CYBERSECURITY AND IOT
As the Internet of Things (IoT) continues to grow rapidly, how will organizations manage the additional risks that the IoT presents within Cybersecurity? What considerations need to be made in order to address the reality that by 2020, IoT will be in 50% of all new technology? How can you gain more ...

5 Reasons AI is the Pillar of the Next-Gen SOC
5 REASONS AI IS THE PILLAR OF THE NEXT-GEN SOC
SOC processes are broken, enterprises are still at risk and analysts are feeling the cybersecurity job fatigue. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How do you imp...

Security and Governance in the Hybrid Multi-Cloud
SECURITY AND GOVERNANCE IN THE HYBRID MULTI-CLOUD
Hybrid cloud solutions are hailed for their combination of scalability, agility and cost-efficiency of public cloud with the increased security and compliance of keeping sensitive data on-premises under your full control.  However, the responsibility for security is shared between the customer ...

Smarter Endpoint Security How to go Beyond Prevention
SMARTER ENDPOINT SECURITY HOW TO GO BEYOND PREVENTION
Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Some companies tout “next-generation endpoint security,” but what does that mean? Register now for this webinar and you will: Learn about the current endpoint security land...

Setting up a cybersecurity operations centre – TVA shows how
SETTING UP A CYBERSECURITY OPERATIONS CENTRE – TVA SHOWS HOW
A common recommendation for utilities is to develop a cybersecurity operations centre to support its refence strategy and this is the approach that has been taken by the Tennessee Valley Authority (TVA) with the implementation of a state-of-the-art centre within its Chattanooga office complex. &ldqu...

Upgrading to Next-Generation Antivirus (NGAV)
UPGRADING TO NEXT-GENERATION ANTIVIRUS (NGAV)
As threats such as ransomware continue to increase, security executives from Major League Baseball (MLB) and the National Hockey League (NHL) decided to collaborate and upgrade their traditional antivirus to next-gen AV solutions to better protect their organizations. Hear what these major league se...

CONTINUOUS ASSURANCE USING DATA THREAT MODELING
CONTINUOUS ASSURANCE USING DATA THREAT MODELING
Ask most security, risk, governance or assurance practitioners what the single most important consideration for their organizations is and there’s a strong likelihood they will tell you that the answer is “the data”. Professionals continuously assess and evaluate the controls they ...

3 Steps to Gain Control of Cloud Security
3 STEPS TO GAIN CONTROL OF CLOUD SECURITY
The cloud is a notable business advantage, but it does bring numerous security concerns. Among them: Lack of visibility across cloud or between on-premises and cloud environments. Monitoring security controls and changes within cloud and multi-cloud environments. Maintaining compliance by monitoring...

Threat Intelligence, Cover Your Bases!
THREAT INTELLIGENCE, COVER YOUR BASES!
As an analyst, you are pulled in many different directions depending on the urgency of the moment. You can go from detecting threats, to formulating a response plan, to blocking real-time cyber-attacks in the blink of an eye, and that doesn’t even include staying on top of the dynamic threat l...

Cloud Security Strategies for SMBs: Top Trends and Tips
CLOUD SECURITY STRATEGIES FOR SMBS: TOP TRENDS AND TIPS
Small and midsize businesses are rapidly moving to the cloud to reduce infrastructure costs while gaining scalability and efficiency. Email servers, web servers, customer relationship manager systems, and even file storage are migrating to off-site services such as Salesforce, Microsoft Azure, and A...

The GDPR Writing Is On the Wall - Act Now to Avoid the Frenzy
THE GDPR WRITING IS ON THE WALL - ACT NOW TO AVOID THE FRENZY
The General Data Protection Regulation (GDPR) is comprehensive, critical to data security, and coming VERY soon. So, are you ready? Results from WatchGuard’s recent worldwide survey on GDPR readiness indicate that many businesses are waiting… but for what? Organizations with employees o...

The 5 Crazy Mistakes Administrators Make with IoT System Credentials
THE 5 CRAZY MISTAKES ADMINISTRATORS MAKE WITH IOT SYSTEM CREDENTIALS
Managing an IoT system’s cybersecurity can be daunting because it can provide a broad and varied attack surface. You might not even know all of the places where there are credentials—let alone how good those credentials are. Did the installer use the same secret across all of the devices...

BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty. Join this webinar for an in-depth discussion of threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting Syste...

Privileged Passwords are Easy Pickings for Attackers – Unless You Make These Fixes
PRIVILEGED PASSWORDS ARE EASY PICKINGS FOR ATTACKERS – UNLESS YOU MAKE THESE FIXES
For many organizations, passwords are the primary means of defense. Yet, organizations still struggle with a holistic approach to managing authentication—particularly for privileged users and accounts. Part of this challenge stems from internal password sprawl. A perfect example is that of a F...

Improving Cyber Resilience of Critical Infrastructure Providers
IMPROVING CYBER RESILIENCE OF CRITICAL INFRASTRUCTURE PROVIDERS
Cyber attacks waged on the grid and critical infrastructure companies are about the scariest we can all imagine. Yet, they are routinely happening. An attack that lands on its target have the potential to cause almost unfathomable societal disruption. Transportation systems could fail, essential pub...

Challenges and Solutions to Securing Applications By Design
CHALLENGES AND SOLUTIONS TO SECURING APPLICATIONS BY DESIGN
Did you know that you could reduce the costs of remediating application security defects by 75% or more by simply shifting and re-prioritizing key Software Development Lifecycle processes? Applications have become among the most targeted of enterprise assets, and yet a disturbingly large percentage ...

A Higher Education in Network Security
A HIGHER EDUCATION IN NETWORK SECURITY
Join us for a candid look behind the curtain of the NOC (Network Operations Center) for BlackHat, some of the most technical information security events in the world. As the official network provider, Ruckus' success at these events mean that our experience, lessons learned and accolades directl...

Battling Lateral Movement, Counter Incident Response & Island Hopping
BATTLING LATERAL MOVEMENT, COUNTER INCIDENT RESPONSE & ISLAND HOPPING
According to the world’s top incident response (IR) professionals, cyberattackers are honing their ability to remain undetected inside the enterprises they’ve breached and evolving their attacks to counter defenders’ response efforts. Most organizations are unprepared to combat suc...

Advanced cyber intelligence techniques: Integrated security testing
ADVANCED CYBER INTELLIGENCE TECHNIQUES: INTEGRATED SECURITY TESTING
While IT security budgets continue to rise, executive management may not have a solid grasp on cybersecurity readiness or the organization’s overall security posture. It starts with understanding the organization’s attack surface (the internal and external footprint that can be an entry ...

How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes
HOW TO PROTECT BILLIONS AGAINST MOBILE BANKING FRAUD: OPEN YOUR EYES
Mobile banking and trading are the new killer apps. Firms compete to make their mobile user experience a more cost-efficient and user-friendly version of every account interaction traditionally conducted in a physical branch or on a personal computer. Financial service firms are ultimately responsib...

Fight security threats and protect your devices
FIGHT SECURITY THREATS AND PROTECT YOUR DEVICES
From the smallest of smart devices to the largest of servers, every piece of technology which is connected to the internet is exposed to the dangers of being hacked. As a result, IT companies have seen the need to constantly adapt their solutions and develop more intelligent capabilities to cope wit...

Get Smart About Ransomware: Protect Yourself and Your Organization
GET SMART ABOUT RANSOMWARE: PROTECT YOURSELF AND YOUR ORGANIZATION
What would you do if your organization's data was held ransom, and the only way to get it back was to pay someone $17,000? That's exactly what Hollywood Presbyterian Medical Center did earlier this year. Ransomware is a type of malicious software restricting access to a victim’s infect...

The Set-and-Forget Web Application Firewall. with AI
THE SET-AND-FORGET WEB APPLICATION FIREWALL. WITH AI
Learn more about a breakthrough "set-and-forget" web application firewall that combats increasing hacker sophistication and addresses the exhaustive and excessive false positive debacle encountered with traditional WAFs.

Everything or Nothing: The Cyber Wars
EVERYTHING OR NOTHING: THE CYBER WARS
Critical infrastructure is defined as, “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety.&rdquo...

How to Improve Cybersecurity Posture in a Climate of Increasing Regulation
HOW TO IMPROVE CYBERSECURITY POSTURE IN A CLIMATE OF INCREASING REGULATION
You’re invited to join experts from BitSight, the global standard in security ratings, and risk management and compliance leader Opus to explore new ways to manage third party risks and compliance and combat cybercrime — focusing on the landmark New York Department of Financial Services ...

DDoS attacks keep breaking world records
DDOS ATTACKS KEEP BREAKING WORLD RECORDS
Join our 45-minute OnDemand webinar to learn about new threats to your services and about new architectures that can protect them to keep ahead of this shifting landscape. This year DDoS attacks have intensified to become the most destructive malware to hit service providers. Recent attacks have rea...

HOW TO STAY RESILIENT TO BREACHES & AUDITORS
HOW TO STAY RESILIENT TO BREACHES & AUDITORS
The GDPR is Here: How to Stay Resilient to Breaches and Auditors. In this session of our Webinar Wednesday series, Dataguise discusses the General Data Protection Regulation (GDPR) and how organizations can prevent breaches and audits. The presenter explores technology to help enterprise organizatio...

Email: Still A Top Threat Vector!
EMAIL: STILL A TOP THREAT VECTOR!
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including: Why sma...

ARC, Nozomi Webinar on Cybersecurity and IT/OT Convergence
ARC, NOZOMI WEBINAR ON CYBERSECURITY AND IT/OT CONVERGENCE
Convergence of Different Organizations with Different Values. Convergence has obvious implications for cybersecurity. OT’s focus on non-stop operations and eliminating unscheduled downtime is raising the cybersecurity issue on the IT side, and increased data from IT is raising the same issue o...

Ransomware and Other Emerging Threats Within Healthcare Organizations
RANSOMWARE AND OTHER EMERGING THREATS WITHIN HEALTHCARE ORGANIZATIONS
The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actor...

Cybersecurity and Data Privacy Essentials for Financial Service Providers
CYBERSECURITY AND DATA PRIVACY ESSENTIALS FOR FINANCIAL SERVICE PROVIDERS
Join us for a discussion of recent trends and developments in cybersecurity and data protection for the financial services industry. The webinar will focus on issues that small to mid-size firms should be thinking about. In addition to discussing recent developments, we will examine recent guidance ...

Never Trust, Always Verify
NEVER TRUST, ALWAYS VERIFY
The perimeter model of network security is broken – attackers have little difficulty in spoofing IP addresses or piggybacking malicious software on top of policy-permitted network traffic to gain access to the network. And once inside the network, it's a simple task for attackers to move l...

Why Your WAF Will Eventually Fail You
WHY YOUR WAF WILL EVENTUALLY FAIL YOU
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basi...

Navigating a Breach & Activating a Proven Incident Response Plan
NAVIGATING A BREACH & ACTIVATING A PROVEN INCIDENT RESPONSE PLAN
Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterd...

Fortifying Your Organization
FORTIFYING YOUR ORGANIZATION'S LAST LAYER OF SECURITY
Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat...

Information Security Exposures: Creating and Sustaining a Culture of Security
INFORMATION SECURITY EXPOSURES: CREATING AND SUSTAINING A CULTURE OF SECURITY
MGI Worldwide members from across the globe took part in our latest webinar on July 24th, hosted by Founding Partner, Producer and Vice-President Stephen Vono of McGowanPRO. Titled 'Information Security Exposures: Creating and Sustaining a Culture of Security’ the webinar was geared toward...

Matching Application Security to Business Needs
MATCHING APPLICATION SECURITY TO BUSINESS NEEDS
Applications are the #1 attack target of hackers, so application security should be an integral part of your software development tools and processes. At the same time, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself lost in sea of confusing 3 and ...

Why You Should Be Using Deception: Decoys, Honeypots, and Red Herrings
WHY YOU SHOULD BE USING DECEPTION: DECOYS, HONEYPOTS, AND RED HERRINGS
Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys and honeypots can be high-value, low-noise, and identify threats previously thought to be undetectable. Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist,...

Mobile Security On-device or in the Cloud?  Hackers Have a Preference
MOBILE SECURITY ON-DEVICE OR IN THE CLOUD? HACKERS HAVE A PREFERENCE
In today’s cyber environment, detection on-device vs. in the cloud may seem like a tough choice. However, given the speed of attacks, delays of going to the cloud and privacy concerns of end users, the benefits of on-device mobile threat defense far outweigh the cloud. For enterprises with emp...

How’s it Going for Your Endpoint & Mobile Security Projects?
HOW’S IT GOING FOR YOUR ENDPOINT & MOBILE SECURITY PROJECTS?
Now that the privacy policy updates have settled, it’s time to look at how well you adapted to the GDPR mandates. When it comes to your computing endpoints, did you scramble last minute to reach compliance? Or, were your systems built by forward-thinking companies to already include the functi...

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments
ADDRESSING THE EMERGING MOBILE CYBERSECURITY THREATS FACING STATE AND LOCAL GOVERNMENTS
The number and cost of cyber attacks on the public sector is growing. According to Accenture’s 2017 “Cost of Cyber Crime Study,” the average cost of a successful public sector cyber breach in 2017 increased $1.43 million over the previous year to $8.2 million. Experts indicate that...

Here Phishy, Phishy, Phishy!
HERE PHISHY, PHISHY, PHISHY!
Definitionally, phishing is a social engineering attack that tricks users into clicking on a link that takes them to a site that either a) delivers a malicious payload to compromise a device, or b) further tricks them into divulging their credentials. While the former immediately weaponizes the devi...

The State of Mobile Device Threats:  2018 H1 Mobile Threat Report
THE STATE OF MOBILE DEVICE THREATS: 2018 H1 MOBILE THREAT REPORT
Enterprise devices running Zimperium's mobile security detect several types of mobile device risks and threats as they connect around the world. Each of the risks and attacks produces detailed forensics in order to remediate and diagnose each event. Zimperium would like to share the mobile threa...

Hacking Mobile Applications
HACKING MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries inherent and unique threats, and traditional software defences and development methodologies are not sufficient to ...

Threats and Challenges of Mobile Applications
THREATS AND CHALLENGES OF MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries unique threats and traditional software defenses are not sufficient to thwart them. In this on demand webinar, Secu...

Security for IBM Cloud
SECURITY FOR IBM CLOUD
Recent headlines have shown that failing to secure cloud applications has dire consequences. Responsibility for securing the cloud lies not only with security teams, but also with DevOps and operations teams who are charged with ensuring appropriate security controls are used. In addition, organizat...

2018 Cyber Security Predictions for an Unpredictable World
2018 CYBER SECURITY PREDICTIONS FOR AN UNPREDICTABLE WORLD
It’s right before the holidays, so might be a great time to shift gears and join an interesting and lively discussion about what 2018 may hold in store when it comes to cyber security predictions. Will Twitter and Facebook continue to be compromised by trolls aiming to fan the flames of discor...

Ten security controls for effective cybersecurity
TEN SECURITY CONTROLS FOR EFFECTIVE CYBERSECURITY
Security experts have predicted that this year's cyberthreats will be far worse than last's, with ransomware, DDoS, phishing, and cryptojacking attacks becoming even more sophisticated. Faced with an increase in cyberattacks and strict compliance regulations—like the EU's General D...

Securing Healthcare through Identity and the Cloud
SECURING HEALTHCARE THROUGH IDENTITY AND THE CLOUD
In this webinar, Sandy Dalal, Director of Identity and Access Management Services at Allergan, and Krystal Wang, product evangelist at Okta, will explore the role of identity in healthcare security frameworks. Sandy will also share Allergan's journey in its adoption of modern identity solutions ...

Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
IDENTITY IS SECURITY: AVOIDING THE PITFALLS OF AN AUTHENTICATION-CENTRIC SECURITY ARCHITECTURE
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data ar...