home.aspx
 
.

Webinars

The 5 Crazy Mistakes Administrators Make with IoT System Credentials
THE 5 CRAZY MISTAKES ADMINISTRATORS MAKE WITH IOT SYSTEM CREDENTIALS
Managing an IoT system’s cybersecurity can be daunting because it can provide a broad and varied attack surface. You might not even know all of the places where there are credentials—let alone how good those credentials are. Did the installer use the same secret across all of the devices...

BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty. Join this webinar for an in-depth discussion of threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting Syste...

Privileged Passwords are Easy Pickings for Attackers – Unless You Make These Fixes
PRIVILEGED PASSWORDS ARE EASY PICKINGS FOR ATTACKERS – UNLESS YOU MAKE THESE FIXES
For many organizations, passwords are the primary means of defense. Yet, organizations still struggle with a holistic approach to managing authentication—particularly for privileged users and accounts. Part of this challenge stems from internal password sprawl. A perfect example is that of a F...

Improving Cyber Resilience of Critical Infrastructure Providers
IMPROVING CYBER RESILIENCE OF CRITICAL INFRASTRUCTURE PROVIDERS
Cyber attacks waged on the grid and critical infrastructure companies are about the scariest we can all imagine. Yet, they are routinely happening. An attack that lands on its target have the potential to cause almost unfathomable societal disruption. Transportation systems could fail, essential pub...

Challenges and Solutions to Securing Applications By Design
CHALLENGES AND SOLUTIONS TO SECURING APPLICATIONS BY DESIGN
Did you know that you could reduce the costs of remediating application security defects by 75% or more by simply shifting and re-prioritizing key Software Development Lifecycle processes? Applications have become among the most targeted of enterprise assets, and yet a disturbingly large percentage ...

A Higher Education in Network Security
A HIGHER EDUCATION IN NETWORK SECURITY
Join us for a candid look behind the curtain of the NOC (Network Operations Center) for BlackHat, some of the most technical information security events in the world. As the official network provider, Ruckus' success at these events mean that our experience, lessons learned and accolades directl...

Battling Lateral Movement, Counter Incident Response & Island Hopping
BATTLING LATERAL MOVEMENT, COUNTER INCIDENT RESPONSE & ISLAND HOPPING
According to the world’s top incident response (IR) professionals, cyberattackers are honing their ability to remain undetected inside the enterprises they’ve breached and evolving their attacks to counter defenders’ response efforts. Most organizations are unprepared to combat suc...

Advanced cyber intelligence techniques: Integrated security testing
ADVANCED CYBER INTELLIGENCE TECHNIQUES: INTEGRATED SECURITY TESTING
While IT security budgets continue to rise, executive management may not have a solid grasp on cybersecurity readiness or the organization’s overall security posture. It starts with understanding the organization’s attack surface (the internal and external footprint that can be an entry ...

How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes
HOW TO PROTECT BILLIONS AGAINST MOBILE BANKING FRAUD: OPEN YOUR EYES
Mobile banking and trading are the new killer apps. Firms compete to make their mobile user experience a more cost-efficient and user-friendly version of every account interaction traditionally conducted in a physical branch or on a personal computer. Financial service firms are ultimately responsib...

Fight security threats and protect your devices
FIGHT SECURITY THREATS AND PROTECT YOUR DEVICES
From the smallest of smart devices to the largest of servers, every piece of technology which is connected to the internet is exposed to the dangers of being hacked. As a result, IT companies have seen the need to constantly adapt their solutions and develop more intelligent capabilities to cope wit...

Get Smart About Ransomware: Protect Yourself and Your Organization
GET SMART ABOUT RANSOMWARE: PROTECT YOURSELF AND YOUR ORGANIZATION
What would you do if your organization's data was held ransom, and the only way to get it back was to pay someone $17,000? That's exactly what Hollywood Presbyterian Medical Center did earlier this year. Ransomware is a type of malicious software restricting access to a victim’s infect...

The Set-and-Forget Web Application Firewall. with AI
THE SET-AND-FORGET WEB APPLICATION FIREWALL. WITH AI
Learn more about a breakthrough "set-and-forget" web application firewall that combats increasing hacker sophistication and addresses the exhaustive and excessive false positive debacle encountered with traditional WAFs.

Everything or Nothing: The Cyber Wars
EVERYTHING OR NOTHING: THE CYBER WARS
Critical infrastructure is defined as, “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety.&rdquo...

How to Improve Cybersecurity Posture in a Climate of Increasing Regulation
HOW TO IMPROVE CYBERSECURITY POSTURE IN A CLIMATE OF INCREASING REGULATION
You’re invited to join experts from BitSight, the global standard in security ratings, and risk management and compliance leader Opus to explore new ways to manage third party risks and compliance and combat cybercrime — focusing on the landmark New York Department of Financial Services ...

DDoS attacks keep breaking world records
DDOS ATTACKS KEEP BREAKING WORLD RECORDS
Join our 45-minute OnDemand webinar to learn about new threats to your services and about new architectures that can protect them to keep ahead of this shifting landscape. This year DDoS attacks have intensified to become the most destructive malware to hit service providers. Recent attacks have rea...

HOW TO STAY RESILIENT TO BREACHES & AUDITORS
HOW TO STAY RESILIENT TO BREACHES & AUDITORS
The GDPR is Here: How to Stay Resilient to Breaches and Auditors. In this session of our Webinar Wednesday series, Dataguise discusses the General Data Protection Regulation (GDPR) and how organizations can prevent breaches and audits. The presenter explores technology to help enterprise organizatio...

Email: Still A Top Threat Vector!
EMAIL: STILL A TOP THREAT VECTOR!
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including: Why sma...

ARC, Nozomi Webinar on Cybersecurity and IT/OT Convergence
ARC, NOZOMI WEBINAR ON CYBERSECURITY AND IT/OT CONVERGENCE
Convergence of Different Organizations with Different Values. Convergence has obvious implications for cybersecurity. OT’s focus on non-stop operations and eliminating unscheduled downtime is raising the cybersecurity issue on the IT side, and increased data from IT is raising the same issue o...

Ransomware and Other Emerging Threats Within Healthcare Organizations
RANSOMWARE AND OTHER EMERGING THREATS WITHIN HEALTHCARE ORGANIZATIONS
The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actor...

Cybersecurity and Data Privacy Essentials for Financial Service Providers
CYBERSECURITY AND DATA PRIVACY ESSENTIALS FOR FINANCIAL SERVICE PROVIDERS
Join us for a discussion of recent trends and developments in cybersecurity and data protection for the financial services industry. The webinar will focus on issues that small to mid-size firms should be thinking about. In addition to discussing recent developments, we will examine recent guidance ...

Never Trust, Always Verify
NEVER TRUST, ALWAYS VERIFY
The perimeter model of network security is broken – attackers have little difficulty in spoofing IP addresses or piggybacking malicious software on top of policy-permitted network traffic to gain access to the network. And once inside the network, it's a simple task for attackers to move l...

Why Your WAF Will Eventually Fail You
WHY YOUR WAF WILL EVENTUALLY FAIL YOU
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basi...

Navigating a Breach & Activating a Proven Incident Response Plan
NAVIGATING A BREACH & ACTIVATING A PROVEN INCIDENT RESPONSE PLAN
Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterd...

Fortifying Your Organization
FORTIFYING YOUR ORGANIZATION'S LAST LAYER OF SECURITY
Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat...

Information Security Exposures: Creating and Sustaining a Culture of Security
INFORMATION SECURITY EXPOSURES: CREATING AND SUSTAINING A CULTURE OF SECURITY
MGI Worldwide members from across the globe took part in our latest webinar on July 24th, hosted by Founding Partner, Producer and Vice-President Stephen Vono of McGowanPRO. Titled 'Information Security Exposures: Creating and Sustaining a Culture of Security’ the webinar was geared toward...

Matching Application Security to Business Needs
MATCHING APPLICATION SECURITY TO BUSINESS NEEDS
Applications are the #1 attack target of hackers, so application security should be an integral part of your software development tools and processes. At the same time, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself lost in sea of confusing 3 and ...

Why You Should Be Using Deception: Decoys, Honeypots, and Red Herrings
WHY YOU SHOULD BE USING DECEPTION: DECOYS, HONEYPOTS, AND RED HERRINGS
Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys and honeypots can be high-value, low-noise, and identify threats previously thought to be undetectable. Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist,...

Mobile Security On-device or in the Cloud?  Hackers Have a Preference
MOBILE SECURITY ON-DEVICE OR IN THE CLOUD? HACKERS HAVE A PREFERENCE
In today’s cyber environment, detection on-device vs. in the cloud may seem like a tough choice. However, given the speed of attacks, delays of going to the cloud and privacy concerns of end users, the benefits of on-device mobile threat defense far outweigh the cloud. For enterprises with emp...

How’s it Going for Your Endpoint & Mobile Security Projects?
HOW’S IT GOING FOR YOUR ENDPOINT & MOBILE SECURITY PROJECTS?
Now that the privacy policy updates have settled, it’s time to look at how well you adapted to the GDPR mandates. When it comes to your computing endpoints, did you scramble last minute to reach compliance? Or, were your systems built by forward-thinking companies to already include the functi...

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments
ADDRESSING THE EMERGING MOBILE CYBERSECURITY THREATS FACING STATE AND LOCAL GOVERNMENTS
The number and cost of cyber attacks on the public sector is growing. According to Accenture’s 2017 “Cost of Cyber Crime Study,” the average cost of a successful public sector cyber breach in 2017 increased $1.43 million over the previous year to $8.2 million. Experts indicate that...

Here Phishy, Phishy, Phishy!
HERE PHISHY, PHISHY, PHISHY!
Definitionally, phishing is a social engineering attack that tricks users into clicking on a link that takes them to a site that either a) delivers a malicious payload to compromise a device, or b) further tricks them into divulging their credentials. While the former immediately weaponizes the devi...

The State of Mobile Device Threats:  2018 H1 Mobile Threat Report
THE STATE OF MOBILE DEVICE THREATS: 2018 H1 MOBILE THREAT REPORT
Enterprise devices running Zimperium's mobile security detect several types of mobile device risks and threats as they connect around the world. Each of the risks and attacks produces detailed forensics in order to remediate and diagnose each event. Zimperium would like to share the mobile threa...

Hacking Mobile Applications
HACKING MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries inherent and unique threats, and traditional software defences and development methodologies are not sufficient to ...

Threats and Challenges of Mobile Applications
THREATS AND CHALLENGES OF MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries unique threats and traditional software defenses are not sufficient to thwart them. In this on demand webinar, Secu...

Security for IBM Cloud
SECURITY FOR IBM CLOUD
Recent headlines have shown that failing to secure cloud applications has dire consequences. Responsibility for securing the cloud lies not only with security teams, but also with DevOps and operations teams who are charged with ensuring appropriate security controls are used. In addition, organizat...

2018 Cyber Security Predictions for an Unpredictable World
2018 CYBER SECURITY PREDICTIONS FOR AN UNPREDICTABLE WORLD
It’s right before the holidays, so might be a great time to shift gears and join an interesting and lively discussion about what 2018 may hold in store when it comes to cyber security predictions. Will Twitter and Facebook continue to be compromised by trolls aiming to fan the flames of discor...

Ten security controls for effective cybersecurity
TEN SECURITY CONTROLS FOR EFFECTIVE CYBERSECURITY
Security experts have predicted that this year's cyberthreats will be far worse than last's, with ransomware, DDoS, phishing, and cryptojacking attacks becoming even more sophisticated. Faced with an increase in cyberattacks and strict compliance regulations—like the EU's General D...

Securing Healthcare through Identity and the Cloud
SECURING HEALTHCARE THROUGH IDENTITY AND THE CLOUD
In this webinar, Sandy Dalal, Director of Identity and Access Management Services at Allergan, and Krystal Wang, product evangelist at Okta, will explore the role of identity in healthcare security frameworks. Sandy will also share Allergan's journey in its adoption of modern identity solutions ...

Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
IDENTITY IS SECURITY: AVOIDING THE PITFALLS OF AN AUTHENTICATION-CENTRIC SECURITY ARCHITECTURE
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data ar...

Take the first steps towards GDPR compliance
TAKE THE FIRST STEPS TOWARDS GDPR COMPLIANCE
Over the past year, IT Governance’s data protection and information security experts have shared – and continue to share – their understanding of the new General Data Protection Regulation (GDPR) through green papers, training courses, blogs and webinars in order to encourage organ...

The State of Mobile Device Security in Government – June 27, 2018
THE STATE OF MOBILE DEVICE SECURITY IN GOVERNMENT – JUNE 27, 2018
Webinar to highlight emerging mobile cybersecurity threats facing state and local governments, and what these entities can do to better protect mobile data. Zimperium is hosting a webinar for customers, media and the general public. Karen Jackson, Former Secretary of Technology for the Commonwealth ...

Threat Modeling to Reduce Real Software Security Risk
THREAT MODELING TO REDUCE REAL SOFTWARE SECURITY RISK
Application security risk management is about identifying key threats, implementing countermeasures, and validating your defenses are robust. It is technique often used just prior to testing; however, it has value from requirements gathering all the way through to application construction and deploy...

Getting Practical about Cybersecurity: What Must the Energy Sector Do to Raise Readiness?
GETTING PRACTICAL ABOUT CYBERSECURITY: WHAT MUST THE ENERGY SECTOR DO TO RAISE READINESS?
With cyber-attacks in the global energy sector getting more frequent and sophisticated, what steps should your organization be taking to strengthen cyber hygiene and overcome its cyber confidence gap? Find out by watching this on-demand webinar from the International Society of Automation, recorded ...

IT and Security - Working Better Together with ServiceNow and Rapid7
IT AND SECURITY - WORKING BETTER TOGETHER WITH SERVICENOW AND RAPID7
The relationship between IT and security can be complicated, but your vulnerability remediation doesn't have to be. It is inevitable running into challenges when IT teams are working with security teams on vulnerability remediation. Join Ken Mizota as he discusses those challenges that we all fa...

Recent Mobile Threat Trends
RECENT MOBILE THREAT TRENDS
Mobile threats continue to grow as threat actors look to target users of these devices for ransomware, espionage, or now, cryptocurrency mining. Join my monthly threat webinar and live Q&A session to learn about: Recent trends in mobile security threats. How these threats work. Steps to minimize...

Cloud Powered Application Security Testing
CLOUD POWERED APPLICATION SECURITY TESTING
Web application attacks continue to be the number one source of data breaches according to the 2017 Verizon DBIR. Rapid7 InsightAppSec is the latest solution to be delivered on the Insight platform, designed to identify and measure your application risk and assist in remediation so that your applica...

Secure your mobile devices against Threat
SECURE YOUR MOBILE DEVICES AGAINST THREAT
Smartphones and tablets have become an indispensable part of our lives. And as a result, hackers and cybercriminals are increasingly targeting mobile users to obtain both corporate and personal information. Join IBM Mobile Security expert Biju Tilak in an exclusive in-depth webinar that sheds light ...

Soaring Global Cyber-Gotchas: Dissecting the Ever-Expanding Threat Landscape
SOARING GLOBAL CYBER-GOTCHAS: DISSECTING THE EVER-EXPANDING THREAT LANDSCAPE
This quarter's threat landscape report revealed a distinct shift of cyber criminals turning their focus from ransomware to crypto jacking. We'll cover why crypto mining malware detections have more than doubled and where this trend has permeated. Plus, how these attacks are becoming more fin...

HOW TO REFRAME YOUR CYBERSECURITY STRATEGY
HOW TO REFRAME YOUR CYBERSECURITY STRATEGY
If your mission-critical systems are digital and are connected in some form or fashion to the internet (even if you think they aren’t, it’s highly likely they are), can they ever be made fully safe from cyberattacks? Cybersecurity expert Andy Bochman says the answer is no – and tha...

PROTECT YOUR ORGANIZATION AGAINST RANSOMWARE
PROTECT YOUR ORGANIZATION AGAINST RANSOMWARE
Let’s face facts, if your organization is not properly backing up data and planning for worst-case scenarios, you're company is probably at risk for a ransomware attack – and that’s a very risky proposition.  With the recent global ransomware attack, known now as “Wa...

OWASP Top 10 Threats & Mitigations
OWASP TOP 10 THREATS & MITIGATIONS
The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack. This webcast series presents the OWASP Top 10 in an abridged format, ...

The Five "Hows": How Cybersecurity Helps Drive Business Agility
THE FIVE "HOWS": HOW CYBERSECURITY HELPS DRIVE BUSINESS AGILITY
Information and cyber security is the prime concern for all the businesses today. The significant of businesses from conventional approach of operations to futuristic digital operations has raised various security issues for companies that need to be addressed before they could do irreparable harm. ...

Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
PANEL WEBINAR: REDUCING THE CYBER EXPOSURE GAP FROM CLOUD TO CONTAINERS
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of ...

Reducing Application Risk:  What Technology Can & Can’t Protect Against
REDUCING APPLICATION RISK: WHAT TECHNOLOGY CAN & CAN’T PROTECT AGAINST
Applications are the primary target of attack. Due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk.  This webcast will educate IT and development teams on technologies available to build and deploy more secure software systems and debunks ...

Dealing with Cyber Security Threats
DEALING WITH CYBER SECURITY THREATS
In this webinar, attendees will learn how to understand and mitigate cyber security threats in their CCTV, access control, and intercom installations, and discuss legal, insurance, and liability problems for the systems integrator. Webinar attendees will gain a better understanding of: – Under...

What Machine Learning Can (and Can
WHAT MACHINE LEARNING CAN (AND CAN'T) DO TO HELP SOLVE TODAY'S MOBILE SECURITY PROBLEMS
The security industry frequently throws around the buzz words “Machine learning” and “artificial intelligence”, but how can you separate fact from fiction regarding claims about these technologies? And what role and value do these technologies actually have in solving today&r...

Ransomware in the Age of Wannacry: What Fintech Needs to Know
RANSOMWARE IN THE AGE OF WANNACRY: WHAT FINTECH NEEDS TO KNOW
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on. This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the e...

Webroot Smarter Cybersecurity For The Connected World
WEBROOT SMARTER CYBERSECURITY FOR THE CONNECTED WORLD
Webroot Smarter Cybersecurity for The Connected World. Watch this video to learn how Webroot provides smarter cybersecurity solutions to businesses all over the world. Try Webroot for yourself at webroot.com/businesstrials.

Webinar: Measuring Your Cyber Security Risk
WEBINAR: MEASURING YOUR CYBER SECURITY RISK
Safeguarding against the inevitable requires a clear understanding of your cyber risk factors. But how do you determine that number?  In this on demand webinar, Jeff Schilling, Chief Security Officer at Armor, explores a simple equation that helps protect organizations by identifying their cybe...

Transform Time into a Cybersecurity Advantage
TRANSFORM TIME INTO A CYBERSECURITY ADVANTAGE
What determines success in security? Increasingly, the answer is “time.” Today, attackers have a time advantage. They design attacks that deliberately hide from defenses, and spread across your infrastructure in stealth while evading detection. Defenders must identify strategies that all...

2017 - State of Malware
2017 - STATE OF MALWARE
In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who h...

Elasticsearch Cybersecurity Webinar Series: Addressing Security Gaps
ELASTICSEARCH CYBERSECURITY WEBINAR SERIES: ADDRESSING SECURITY GAPS
Search is a powerful solution that helps you identify your weaknesses and proactively minimize risk to your organization. Cybersecurity expert, Kevin Keeney, dives into how to address security gaps. Highlights Include: How open source augments traditional security models. New ways of thinking about ...

Artificial Intelligence in the Cyber Domain
ARTIFICIAL INTELLIGENCE IN THE CYBER DOMAIN
Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense. On April 19, join Michelle Cantos, Strate...

M-Trends 2018 - Understanding Today
M-TRENDS 2018 - UNDERSTANDING TODAY'S CYBER ATTACK TRENDS
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape. During this webinar, Managing Director Chris Nut...

Cyber Essentials webinar
CYBER ESSENTIALS WEBINAR
Cyber Essentials is a cyber security certification scheme that addresses five key security controls and sets out a good baseline of cyber security suitable for all organisations in all sectors. With Cyber Essentials, organisations can focus on core business objectives, drive business efficiency and ...

PandaLabs Reveals the Cybersecurity Trends in Store for 2018 - Panda Security Webinar
PANDALABS REVEALS THE CYBERSECURITY TRENDS IN STORE FOR 2018 - PANDA SECURITY WEBINAR
Today, more malware samples are created in just a few hours than in the entire twentieth century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more precisely designed. Attackers are meticulously studying their victims ...

Why VMware NSX, AirWatch & vSphere will redefine your Approach to Cyber Security
WHY VMWARE NSX, AIRWATCH & VSPHERE WILL REDEFINE YOUR APPROACH TO CYBER SECURITY
Data breaches, cyber-attacks, security lapses and new regulations have made IT security more challenging than ever now that every organization has gone digital. IT teams are struggling with points solutions, as the traditional security approach no longer works. Explore how VMware makes cyber securit...

Integrated Cyber Threat Intelligence, Threat Hunting and Response With IBM i2, QRadar and Resilient
INTEGRATED CYBER THREAT INTELLIGENCE, THREAT HUNTING AND RESPONSE WITH IBM I2, QRADAR AND RESILIENT
With the rise of advanced threats, the SOC is faced with the growing challenge of adversaries skilled at evading detection. In addition, analysts are overwhelmed by the volume and complexity of data, and they often struggle to find the signal in the noise. Discover how IBM i2, QRadar and Resilient p...

Cybersecurity Fundamentals for Everyone
CYBERSECURITY FUNDAMENTALS FOR EVERYONE
Cyber is full of complicated words and alien concepts. In this webinar we will define the concepts and phrases you need to know, and explain how to get started on cyber security. Subscribe to the ITMPI to access over 1000+ hours of on demand, PDU approved webinars: http://www.itmpi.org/subscribe Fre...

Password Management: Getting Down to Business
PASSWORD MANAGEMENT: GETTING DOWN TO BUSINESS
Passwords have become a necessity in today’s world and are relied upon by a variety of different services to ensure safe and secure access. However, users complain about the burden of coming up with complex passwords, and the even bigger challenge of remembering multiple passwords. What’...

2018 Threat Predictions New Devices, New Threats
2018 THREAT PREDICTIONS NEW DEVICES, NEW THREATS
Please join McAfee leading researchers from McAfee Labs and Office of the CTO as they share threat landscape predictions for 2018. We find ourselves in a highly volatile stage of cybersecurity, with new devices, new risks, and new threats appearing every day. In this webcast, Raj Samani, Lynda Grind...

On-Demand Webinar: Breaching the External Network Security Perimeter
ON-DEMAND WEBINAR: BREACHING THE EXTERNAL NETWORK SECURITY PERIMETER
Network security device vendors have done a good job of preventing or minimizing external attacks on enterprise network infrastructure by adding a range of capabilities to their products, such as access control, IPS, VPN, DLP, antivirus, and other threat prevention measures. Now attackers are lookin...

WannaCry Ransomware Attack: Splunk Briefing and Demo
WANNACRY RANSOMWARE ATTACK: SPLUNK BRIEFING AND DEMO
From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects...

CISO Panel: 5 Ways to Combat Modern Security Challenges
CISO PANEL: 5 WAYS TO COMBAT MODERN SECURITY CHALLENGES
Last year saw dramatic shifts in the cybersecurity landscape. The number of data breaches and cyber-attacks is skyrocketing. CISOs and security leaders are struggling to find and invest in the best approaches to combat cybercrime for their organizations. Traditional application security testing meth...

State of Cyber-Security Arms Race: Preparing for what
STATE OF CYBER-SECURITY ARMS RACE: PREPARING FOR WHAT'S COMING IN 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security indust...

The Working Cloud: Tackling the Security Risks
THE WORKING CLOUD: TACKLING THE SECURITY RISKS
Cloud computing offers a credible alternative to traditional IT delivery models.  But there's no doubt about it - entrusting infrastructure and data to a third party will reduce control and introduces new risks that need to be managed.  Rather than being the Department of "NO"...

Cyber Threat Intelligence: Learn How It Can Drive World-Class Security
CYBER THREAT INTELLIGENCE: LEARN HOW IT CAN DRIVE WORLD-CLASS SECURITY
The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business. When it is better utilized, CTI significantly enhances an organization’s ability to anticipate, identify, respond to, and re...

Webcam Panel Threats and Cyber Resilience
WEBCAM PANEL THREATS AND CYBER RESILIENCE
Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks? Join this interactive panel to learn more about: The latest cyber threats. New attack trends. Fighting cyber crim...

Cybersecurity While Traveling
CYBERSECURITY WHILE TRAVELING
Recommendations for cybersecurity while traveling abroad often sound like they were taken directly from the plot of a spy movie: use clean, "throw-away" devices, accounts, and passwords; assume your devices and information will be compromised; pull the batteries out of your devices before ...

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR CHALLENGES FOR THE HEALTHCARE SECTOR AND THE PRACTICAL STEPS TO COMPLIANCE
With growing cyber threats facing the NHS and other healthcare organisations, and the UK government promising patients secure healthcare services, addressing cyber security must be a priority for all organisations handling patient records and sensitive data. To keep pace with the digital landscape a...

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management
2018 IT PRIORITIES: CYBERSECURITY, CLOUD OUTSOURCING & RISK MANAGEMENT
The technology landscape for firms is changing rapidly with new cyber threats cropping up constantly and cloud outsourcing gaining more and more momentum. Join ACG and a panel of experts to gain the insights you’ll need for 2018. Highlights include: CYBER: Which cyber threats really matter, an...

Cyber security in life sciences – Webinar
CYBER SECURITY IN LIFE SCIENCES – WEBINAR
Watch a recording of our webinar held on 7 March 2018, which provides insights into how cyber security can impact life sciences organisations. In this webinar, KPMG Partners Caroline Rivett, Life Sciences Global Cyber Security Leader, and Stan Gallo, Australian leader for Forensic Technology and Cyb...

Addressing The Security Challenges of the Cloud Generation
ADDRESSING THE SECURITY CHALLENGES OF THE CLOUD GENERATION
Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk. Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of Saa...

Info - eents
INFO - EENTS
qwerftgqwe3waqrgrgrgr

Cyber Security: Protecting Assets
CYBER SECURITY: PROTECTING ASSETS
With viewers consuming content on an increasing array of devices and platforms and the virtualisation of workflows, the task of protecting assets has never been so complicated and costly. Add to this the fact that the media industry is a high-profile target for hackers and it becomes clear that cybe...

App Ecosystem Explosion: MaaS360 Features New Partners and Endpoint Security Add-Ons
APP ECOSYSTEM EXPLOSION: MAAS360 FEATURES NEW PARTNERS AND ENDPOINT SECURITY ADD-ONS
IBM Security has expanded its partner ecosystem for unified endpoint management (UEM), now delivering a collection of IBM-certified 3rd party apps that integrate with IBM MaaS360 with Watson. This app ecosystem explosion gives IT & security leaders an intuitive framework to discover, download, a...

Cybersecurity for Small and Medium-Sized Enterprises Using the CIS Controls
CYBERSECURITY FOR SMALL AND MEDIUM-SIZED ENTERPRISES USING THE CIS CONTROLS
This webinar seeks to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with a small number of high priority actions based on the CIS Controls. Taking the approach that not every small business owner is an IT wizard or cybersecurity ninja, this guide focuses on ...

National Cybersecurity Awareness Month 2017
NATIONAL CYBERSECURITY AWARENESS MONTH 2017
National Cybersecurity Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join Michael Kaiser, Executive Director of the Nati...

Smart Cities, Cybersecurity, and The Intersection of IoT
SMART CITIES, CYBERSECURITY, AND THE INTERSECTION OF IOT
IoT and smart cities technologies are impacting – and improving – the business of government at all levels. Powering performance by accelerating processes, agencies are growing increasingly reliant on IoT devices and the data they produce. However, the security implications of these emer...

Why the future for women in security is now
WHY THE FUTURE FOR WOMEN IN SECURITY IS NOW
Cybersecurity remains an area where there is a significant shortage of skilled professionals. In particular, women remain sorely underrepresented. As a part of National Women’s History Month and International Women’s Day Celebrations, IBM leaders will discuss trends and challenges in cyb...

The 2018 Security Threat Landscape
THE 2018 SECURITY THREAT LANDSCAPE
How the progression of cultural IT trends and information security impacts your technological security and security team. How your security approach and technologies enables or hinders cyber security threats. How to arm your security teams and technologies to proactively combat cyber attacks Watchin...

How to Prepare for the 2018 Cyber Threats
HOW TO PREPARE FOR THE 2018 CYBER THREATS
Join Patrick Wheeler, Proofpoint’s Director of Threat Intelligence, on Wednesday, January 24th at 10 AM PT for our webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover: Predictions for the 2018 threat landscape. Key actions you can take to prepare your o...

How to Approach a Cyber Security Review with Your Eyes Wide Open
HOW TO APPROACH A CYBER SECURITY REVIEW WITH YOUR EYES WIDE OPEN
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018....

Building a Strong Information Security Program in 2018
BUILDING A STRONG INFORMATION SECURITY PROGRAM IN 2018
How can you build a strong information security program that ensures the protection of the confidentiality, integrity, and availability of your information assets and supporting infrastructure? How are your governance functions evolving to meet the latest cybersecurity threats? Join this webinar to ...

2018 Trends in Information Security
2018 TRENDS IN INFORMATION SECURITY
In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new cl...

The Keys to Service Provider Network Security
THE KEYS TO SERVICE PROVIDER NETWORK SECURITY
How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations? The answer: Through a comprehensive approach that harnesses that same power – security automation, scalabi...

Architecting Security for the Future: NetOps and SecOps
ARCHITECTING SECURITY FOR THE FUTURE: NETOPS AND SECOPS
Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of ...

Cloud Compliance with New Financial Services Cybersecurity Regulations
CLOUD COMPLIANCE WITH NEW FINANCIAL SERVICES CYBERSECURITY REGULATIONS
The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they dis...

Boost Cyber Security with Human Augmented Machine Learning
BOOST CYBER SECURITY WITH HUMAN AUGMENTED MACHINE LEARNING
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization? In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional i...

Cyber Threat Predictions & Security for 2018
CYBER THREAT PREDICTIONS & SECURITY FOR 2018
With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018. This interactive Q&A panel with security ind...

Secure Development Lessons from Purposely Insecure Applications
SECURE DEVELOPMENT LESSONS FROM PURPOSELY INSECURE APPLICATIONS
Security pros and developers often use insecure apps to teach or demonstrate application vulnerabilities. The main activity is 'hacking' or showing how exploiting a given vulnerability works. WebGoat was (as far as we know) the first purposely insecure app for teaching web application securi...

AI in Cyber Security: Explained
AI IN CYBER SECURITY: EXPLAINED
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI t...

What are the full spectrum of mobile risks in 2018?
WHAT ARE THE FULL SPECTRUM OF MOBILE RISKS IN 2018?
What are the full spectrum of mobile risks in 2018? Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies. With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into...

Cyber Thursday: The Latest Challenges And Solutions To Cyber Threat
CYBER THURSDAY: THE LATEST CHALLENGES AND SOLUTIONS TO CYBER THREAT
Cyber Thursday is a regular monthly broadcast video which provides an update on the latest development in the field of Cyber Security. Every second Thursday of the month the programme will feature a number of contributors and panellists from both within Palo Alto Networks and third party thought lea...

Making Security Strategy Reality: Winning Strategy through Tactics
MAKING SECURITY STRATEGY REALITY: WINNING STRATEGY THROUGH TACTICS
In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals ...

Building a cyber security architecture to combat today’s threats
BUILDING A CYBER SECURITY ARCHITECTURE TO COMBAT TODAY’S THREATS
The cyberattack surface is growing as organisations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defence approach to security is no longer enough to protect your network. In this webinar, Erik Bartholomy, security architect at LogRh...

5 Mobile App Security MUST-DOs in 2018
5 MOBILE APP SECURITY MUST-DOS IN 2018
To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of ...

Protect your organization from cyber attacks
PROTECT YOUR ORGANIZATION FROM CYBER ATTACKS
Security is everyone’s responsibility. With the threat of cyber attacks on the rise, growing concerns over data breaches and the high cost—both to your company’s reputation and bottom line—of a serious hack, you simply cannot assume everyone uses common sense all the time. Wa...

How Aporeto Secures Cloud-native Across Public, Private, & Hybrid Clouds with InfluxData
HOW APORETO SECURES CLOUD-NATIVE ACROSS PUBLIC, PRIVATE, & HYBRID CLOUDS WITH INFLUXDATA
Containerization has increased the pace of innovation and deployment but presents huge challenges around achieving application security as services are spun up, shut down and moved. Consider securing applications components based on their unique identity rather than with IP address ranges. Trireme p...

What GDPR Means for Your Security
WHAT GDPR MEANS FOR YOUR SECURITY
For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the se...

2018 Cyber Security Trends
2018 CYBER SECURITY TRENDS
Following our latest blog post, 7 key cyber trends to know about for 2018, we will host a webinar on Thursday, the 11th of January at 11am where we will delve into these trends in more detail. Sean Rooney, Cyber Risk and Assurance Director will host the 40 minute webinar and will discuss. The threat...

Top Cybersecurity Trends for 2018
TOP CYBERSECURITY TRENDS FOR 2018
Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and its supporting process are increasing in number and sophistication. Traditional IT security leaders have now become digital security leaders as they expand support...

Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
NEXT-GEN DIRECTORY SERVICES: HOW CIAM AND IOT DRIVE SECURITY & PERFORMANCE
The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies as...

Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
CAREER CONVERSATIONS W/ MARY CHANEY - EXPERT IN CYBERSECURITY LAW
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success? Whether you are an experienced professional or just cont...

Cybersecurity for Michigan Manufacturers Webinar
CYBERSECURITY FOR MICHIGAN MANUFACTURERS WEBINAR
Experts from the Michigan Manufacturing Technology Center-West and Brightline Technologies talk about the unique challenges and threats that manufacturers face from cyber attacks. Download this PDF for a 4-Step Cyber Security Program.

Application Security Fundamentals
APPLICATION SECURITY FUNDAMENTALS
Veracode CTO and Co-Founder Chris  Wysopal addresses the fundamentals of application security. The webinar covers some real world examples of vulnerabilities being exploited, how we can reduce the number and severity of vulnerabilities in our applications, and automated software testing techniq...

Eliminate the IOT Security Blind Spot
ELIMINATE THE IOT SECURITY BLIND SPOT
Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses: Where current architecture is falling short, What next-generation architecture should look like, How to address vulnerabilities found in IoT devices/...

Targeted Attacks Illustrated
TARGETED ATTACKS ILLUSTRATED
There’s a multitude of ways in which attackers can get into company networks, and when they’re in, surprisingly many manage to go unnoticed for long periods of time. Why? In the beginning of a targeted attack the advantage is in the attacker’s corner, as defenders have limited ways...

Can Sharing Threat Intel Save Your Data?
CAN SHARING THREAT INTEL SAVE YOUR DATA?
The concept of sharing threat information and indicators of compromise without exposing all of your knowledge and frailties is a constant challenge for the concept of intelligence. This year, however, a flaw in a cloud resulted in a major data breach. Could intelligence sharing have saved the breach...

10 Things to Test Before Buying Your Next-Generation Firewall
10 THINGS TO TEST BEFORE BUYING YOUR NEXT-GENERATION FIREWALL
How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just applicati...

Three Secrets to Becoming a Mobile Security Super Hero
THREE SECRETS TO BECOMING A MOBILE SECURITY SUPER HERO
How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

Data-driven Cybersecurity Defense for Organizations and their Ecosystems
DATA-DRIVEN CYBERSECURITY DEFENSE FOR ORGANIZATIONS AND THEIR ECOSYSTEMS
Many companies rely on staticpoint-in-time security assessments to measure the cybersecurity health of their enterprise and vendor ecosystem. This approach is quickly becoming obsolete in today’s dynamic cyber threat landscape, fraught with increasingly sophisticated adversaries deploying mali...

Counter the Careless Click, Tools to Help You Train Your Users
COUNTER THE CARELESS CLICK, TOOLS TO HELP YOU TRAIN YOUR USERS
Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. Join this 30-minute webinar “Counter the careless click, tools to help you train your users...

Top 5 Cybersecurity Trends for 2018
TOP 5 CYBERSECURITY TRENDS FOR 2018
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends f...

Security and the Changing Value of our Data
SECURITY AND THE CHANGING VALUE OF OUR DATA
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed. Because of this chan...

Top 5 Application Security Risks Threatening Your Business Today
TOP 5 APPLICATION SECURITY RISKS THREATENING YOUR BUSINESS TODAY
A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense. In this webinar, we will share results from our recent primary ...

Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
DATA DRIVEN SECURITY: IMPROVE YOUR SECURITY POSTURE TO DEFEAT YOUR ADVERSARY
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring ...

Top Cybersecurity Priorities for CISOs
TOP CYBERSECURITY PRIORITIES FOR CISOS
Aligning security with business goals remains a challenge for CISOs across industries. In an age of relentless attacks, CISOs need to be proactive, informed and have the resources to launch a resilient cyber defense. Tune in to this interactive panel discussion to learn the key cyber priorities for ...

Addressing the Biggest Problem in Healthcare IT: Protecting Endpoints
ADDRESSING THE BIGGEST PROBLEM IN HEALTHCARE IT: PROTECTING ENDPOINTS
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Endpoint Security: The Final Frontier
ENDPOINT SECURITY: THE FINAL FRONTIER
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Ransomware: The Billion-dollar Innovation Industry
RANSOMWARE: THE BILLION-DOLLAR INNOVATION INDUSTRY
Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.

Bad Rabbit Ransomware: What you need to know to stay safe
BAD RABBIT RANSOMWARE: WHAT YOU NEED TO KNOW TO STAY SAFE
A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been mo...

Emerging DDoS Trends 2017: Empty Threats & Real Attacks
EMERGING DDOS TRENDS 2017: EMPTY THREATS & REAL ATTACKS
This year the cyber-security realm has experienced a few dramatic emerging trends to include a couple of the largest denial-of-service attacks and ransomware outbreaks in history. Follow NSFOCUS as we take a deeper look into these DDoS attacks and some of the processes that now seem to be tied to th...

How to Social Engineer Your Users Into More Secure Behavior
HOW TO SOCIAL ENGINEER YOUR USERS INTO MORE SECURE BEHAVIOR
In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain....

The Software-Defined Datacenter & Security: A Webinar by Bitdefender & VMware
THE SOFTWARE-DEFINED DATACENTER & SECURITY: A WEBINAR BY BITDEFENDER & VMWARE
Software-defined datacenter technologies are a foundational pillar of datacenter transformation to enable digital business and agile IT. In addition to enabling datacenter agility, automation and cost containment, the software-defined datacenter presents new challenges and offers new opportunities a...

Symantec
SYMANTEC'S 2018 CYBERSECURITY PREDICTIONS
In 2018, the Internet of Things (IoT) will take centre stage as botnets, ransomware, and hackers target them with creative techniques such as playing analog sounds to exploit vulnerabilities in these devices. Attackers are also gaining expertise in psychology in decision theory, and may use this kno...

Threat Intelligence 2017: Biggest Breaches and Events
THREAT INTELLIGENCE 2017: BIGGEST BREACHES AND EVENTS
2017 has been another year full of front-page computer security events and incidents. Headlines have bulged with state-sponsored attacks, ransomware, leaks, and a continuing wave of data breaches. In this webcast, Ryan Sommers, threat research manager, and Erika Noerenberg, senior malware analyst, r...

Top 5 Strategies to Prevent Ransomware
TOP 5 STRATEGIES TO PREVENT RANSOMWARE
It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight. In this webinar “Top 5 Strategies to Prevent Ransomware” ...

Understanding your Attack Surface - Research into FT30 organisations
UNDERSTANDING YOUR ATTACK SURFACE - RESEARCH INTO FT30 ORGANISATIONS
Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the ove...

Phishing and Fraud: Latest Trends and Best Practices for Protection
PHISHING AND FRAUD: LATEST TRENDS AND BEST PRACTICES FOR PROTECTION
Join us for this, interactive webinar, where you will learn:What the latest threat trends are that we are seeing in 2017 and going into 2018, Which organizations are most at risk,How you can implement immediate strategies to proactively protect your institution and your customers.

Threat Intelligence-as-a-Service: Fortify Your Security Posture
THREAT INTELLIGENCE-AS-A-SERVICE: FORTIFY YOUR SECURITY POSTURE
Security organizations face numerous challenges, from increasingly large volumes of data and lack of tools and trained staff, to validate intelligence to the inability to operationalize threat intelligence. What’s required is a solution that addresses their business needs at every stage of the...

Keep the Bad Rabbit Ransomware Out of Your IT Garden
KEEP THE BAD RABBIT RANSOMWARE OUT OF YOUR IT GARDEN
On Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. No matter the size of your organization, you could become the target of a Ransomware attack. View this on-demand webinar to learn how you can protect your business from ransomwar...

Malware in SaaS Applications: The Unprotected Exploit
MALWARE IN SAAS APPLICATIONS: THE UNPROTECTED EXPLOIT
SaaS application use is rapidly increasing, with 70% of organizations having at least one application in the cloud(1). At the same time, however, 41% report concerns about the security of cloud solutions(2). In fact, while companies often employ technologies for advanced threats within their organiz...

IT Trends in 2018: Cybersecurity
IT TRENDS IN 2018: CYBERSECURITY
2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and ...

Four Things Every CEO Should Know About Ransomware
FOUR THINGS EVERY CEO SHOULD KNOW ABOUT RANSOMWARE
Ransomware has become a very real threat for most organisations, with attacks like "WannaCry" and "Bad Rabbit" filling news headlines over the last year. In this webinar we look at the key facts every CEO should know about ransomware in order to prepare for a potential attack.

Protecting your Organisation Against the Evolving Threatscape
PROTECTING YOUR ORGANISATION AGAINST THE EVOLVING THREATSCAPE
Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors.

Blazing the Trail: Changes Facing the Cybersecurity Industry
BLAZING THE TRAIL: CHANGES FACING THE CYBERSECURITY INDUSTRY
Join women leading in cybersecurity, Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco, for a lively roundtable discussion on security and data privacy.

Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks
SHRINKING YOUR ATTACK SURFACE: PREVENTING AND CONTAINING MULTI-STAGE WEB ATTACKS
Is your organization better protected than Equifax or Yahoo, as both were compromised using common web application attack vectors? Web application attacks are by far the largest source of breaches. And with historically low spending on web application security, more breaches are expected to come.

The evolution of ransomware and how to protect your organisation
THE EVOLUTION OF RANSOMWARE AND HOW TO PROTECT YOUR ORGANISATION
Ransomware has been a huge talking point over the last year or so with the large scale Wannacry and Petya outbreaks that caused significant damage worldwide. The strains that are now being seen show that cybercriminals are becoming more sophisticated in order to try and bypass security controls in o...

How automated security can deal with insider threats
HOW AUTOMATED SECURITY CAN DEAL WITH INSIDER THREATS
While 74% of organisations feel they are vulnerable to insider attacks, only 42% feel they can deal with them. In fact, it is insiders, hidden in plain sight, who are the real issue for security rather than external threats. But the cloud brings great opportunities to minimize this risk.

The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
THE NEXT LEVEL OF SMARTER ENDPOINT PROTECTION: GOING BEYOND ANTI-VIRUS PRODUCTS
Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses. Attend this webinar as the first step toward a smarter, more adaptive approach ...

Top 2017 Cyberattacks & How to Avoid Them in 2018
TOP 2017 CYBERATTACKS & HOW TO AVOID THEM IN 2018
2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networ...

What attackers know about your mobile apps that you don’t: Banking & FinTech
WHAT ATTACKERS KNOW ABOUT YOUR MOBILE APPS THAT YOU DON’T: BANKING & FINTECH
Our threat research team spends every waking moment reverse-engineering and cracking mobile apps and devices to help organizations reduce mobile risk. During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog will explain the attacker’s point-of-view, what attacker...

Application Security at the Speed of DevOps
APPLICATION SECURITY AT THE SPEED OF DEVOPS
Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer.

Take Action: Improving Cybersecurity in the Health Care Industry
TAKE ACTION: IMPROVING CYBERSECURITY IN THE HEALTH CARE INDUSTRY
In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations.

Teaming Together to Prevent Attacks and Protect Your Data
TEAMING TOGETHER TO PREVENT ATTACKS AND PROTECT YOUR DATA
Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks.

Ransomware: How to strategically Fight it, Without Breaking the Bank
RANSOMWARE: HOW TO STRATEGICALLY FIGHT IT, WITHOUT BREAKING THE BANK
Ransomware presents some unique challenges to organizations, regardless of the size, industry or geography. However, it has very distinct behavior relative to other kinds of malware. It actually tells you that an attack has taken place.

Facing up to Mobile Security Challenges
FACING UP TO MOBILE SECURITY CHALLENGES
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis.

Pulse Wave Attacks: The New DDoS Threat to Your Network
PULSE WAVE ATTACKS: THE NEW DDOS THREAT TO YOUR NETWORK
Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evang...

A Maturity Model for Healthcare Cybersecurity
A MATURITY MODEL FOR HEALTHCARE CYBERSECURITY
Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations ...

Combining threat intelligence and detection to prevent email based attacks
COMBINING THREAT INTELLIGENCE AND DETECTION TO PREVENT EMAIL BASED ATTACKS
Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move acr...

Cybersecurity in the Digital, Mobile & Cloud Era
CYBERSECURITY IN THE DIGITAL, MOBILE & CLOUD ERA
A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges: Identity that transcends every application access across multiple devices.

Cybersecurity Demystified: Building a Practical & Sensible Cybersecurity Program
CYBERSECURITY DEMYSTIFIED: BUILDING A PRACTICAL & SENSIBLE CYBERSECURITY PROGRAM
Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accident...

Predict Ransomware Attacks Using AI
PREDICT RANSOMWARE ATTACKS USING AI
Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction. How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control commu...

Don
DON'T LET RANSOMWARE KEEP YOU UP AT NIGHT
The proliferation of complex and resilient ransomware variants has dominated recent media headlines. This year has heralded the emergence of self-replicating, worm-like, ransomware in the form WannaCry and Petya.

4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service
4 REASONS NEXT-GENERATION ANTIVIRUS SHOULD BE YOUR NEXT MANAGED SERVICE
There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization a...

Our Security, Delivered Your Way: Channel Profitability as an MSSP
OUR SECURITY, DELIVERED YOUR WAY: CHANNEL PROFITABILITY AS AN MSSP
In the first webinar of this informative series, join WatchGuard and The Channel Company as they take an in-depth look at market trends and opportunities for value added resellers (VARs) transitioning to managed security service providers (MSSPs).

Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security
EXTEND CONTENT & MALWARE ANALYSIS BEYOND PROXYSG TO EMAIL & DOUBLE YOUR SECURITY
Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and...

Providing Security and Threat Protection for the Enterprise - Why It Matters
PROVIDING SECURITY AND THREAT PROTECTION FOR THE ENTERPRISE - WHY IT MATTERS
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

Cognitive Security in Action: Watson at Wimbledon
COGNITIVE SECURITY IN ACTION: WATSON AT WIMBLEDON
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operati...

Comprehensive Cyber Security & Incident Response: CISCO + Splunk
COMPREHENSIVE CYBER SECURITY & INCIDENT RESPONSE: CISCO + SPLUNK
The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
HOW HACKERS EXPLOIT YOUR WINDOWS TOOLS, PART 2: THE WMI THREAT
Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security...

Five Mobile Security Challenges Facing Enterprise
FIVE MOBILE SECURITY CHALLENGES FACING ENTERPRISE
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile.

How to Scale Mobile Application Security Testing
HOW TO SCALE MOBILE APPLICATION SECURITY TESTING
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile. Join Sam Bakken as he shares insights into 5...

2017 Trends in IoT Cyber Attacks
2017 TRENDS IN IOT CYBER ATTACKS
There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual pow...

The Second Coming of Ransomware - Insights into New Developments
THE SECOND COMING OF RANSOMWARE - INSIGHTS INTO NEW DEVELOPMENTS
We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money.

An Elegant and Practical Model for Security Practitioners
AN ELEGANT AND PRACTICAL MODEL FOR SECURITY PRACTITIONERS
Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.

How Threat Intelligence Helps You Combat Targeted Malware
HOW THREAT INTELLIGENCE HELPS YOU COMBAT TARGETED MALWARE
As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. There are steps you can take to defend against ...

Better Protect Your Web Apps by Knowing How They Will Be Attacked
BETTER PROTECT YOUR WEB APPS BY KNOWING HOW THEY WILL BE ATTACKED
Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will: gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise, ...

Stop Living in the Past: A New Approach to Application Security
STOP LIVING IN THE PAST: A NEW APPROACH TO APPLICATION SECURITY
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point.

Introducing CDL - The Cybersecurity Data Lake
INTRODUCING CDL - THE CYBERSECURITY DATA LAKE
An introduction to CDL, the world's first managed on-premise and cloud cybersecurity data lake. Developed with Intel and leading data center, cloud and security vendors, CDL is designed to democratize security analytics at scale, unlock the potential of today’s siloed security solutions.

Be Ready or Pay the Price: Defending Against the Next Ransomware Attack
BE READY OR PAY THE PRICE: DEFENDING AGAINST THE NEXT RANSOMWARE ATTACK
Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities.

The Future of Cyber Security - Facts & Predictions
THE FUTURE OF CYBER SECURITY - FACTS & PREDICTIONS
Ransomware, one of today's biggest security threats, has become a massive growth opportunity for our channel. As key stakeholders fear now that their organisation will eventually be hit by a ransomware attack, they are willing to spend more on IT security solutions.

The State of Application Security: Hackers On Steroids
THE STATE OF APPLICATION SECURITY: HACKERS ON STEROIDS
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications. This webinar will detail key insights from the ...

Disrupting Credential-based Attacks
DISRUPTING CREDENTIAL-BASED ATTACKS
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials. In this session, get detai...

Secure Your Business: How to Improve Threat Detection & Response
SECURE YOUR BUSINESS: HOW TO IMPROVE THREAT DETECTION & RESPONSE
Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. So how do you improve your company’s security? How should you prioritize? How can you integrate a...

Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
LEARN HOW THE NIST CYBERSECURITY FRAMEWORK BENEFITS STATE AND LOCAL GOVERNMENTS
The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture. Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and loc...

The Worst Privacy and Security Risks and How To Defend Against Them
THE WORST PRIVACY AND SECURITY RISKS AND HOW TO DEFEND AGAINST THEM
We live in the age of high-profile breaches and cyber attacks. Every organization is a target, especially in the financial, healthcare and government space. With so much at stake in the event of a breach, what are the biggest cybersecurity risks for organizations? How should we defend against them? ...

Trends in Phishing Response Strategies
TRENDS IN PHISHING RESPONSE STRATEGIES
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

The cyber security challenges faced by businesses adopting a BYOD strategy
THE CYBER SECURITY CHALLENGES FACED BY BUSINESSES ADOPTING A BYOD STRATEGY
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

Crisis Management Techniques for Cyber Attacks
CRISIS MANAGEMENT TECHNIQUES FOR CYBER ATTACKS
The discussion focuses specifically on how to prevent and be best prepared for cyber-attacks in a situation of a crisis.Main points covered:What is a crisis and what are its common features? Business Continuity threats: How likely is that a cyber-attack will occur? Statistics: What industries are at...

Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
MALWARE DETECTION - HOW TO SPOT INFECTIONS EARLY WITH ALIENVAULT USM ANYWHERE
Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of...

Advanced Attacker Deception: Taking Action on the New Threat Terrain
ADVANCED ATTACKER DECEPTION: TAKING ACTION ON THE NEW THREAT TERRAIN
As businesses advance their use of emerging technologies, they also create new openings for cyber attackers. The key to protecting your organization from APTs and other sophisticated threats is to detect intrusions as early as possible in the attack cycle. But this is easier said than done. Using va...

Advanced DDoS Attack Protection
ADVANCED DDOS ATTACK PROTECTION
Government Agencies, Enterprises and Service Providers all experience continuous cybersecurity attacks that often begin with Distributed Denial of Service (DDoS) attacks. DDoS attacks are a world-wide phenomenon impacting all industries, are more complex than ever before, and are increasing in size ...

Are You Prepared for Ransomware?
ARE YOU PREPARED FOR RANSOMWARE?
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, ex...

Staying Ahead of Cyber Attacks | Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS | NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
Can the managed detection and response (MDR) framework protect organizations from today’s advanced, sophisticated threats?  In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber secu...

Endpoint Detection and Response is not enough
ENDPOINT DETECTION AND RESPONSE IS NOT ENOUGH
Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on ...

Stop Pulling Your Hair about Cyber Threats
STOP PULLING YOUR HAIR ABOUT CYBER THREATS
You can construct & deconstruct your app environments and integrate security testing tools while assessing vulnerabilities before releasing to production. Getting anxious about cyber attacks? You're not alone: there’s hardly a day passing by without news of a security breach. Keeping a...

Staying Ahead of Cyber Attacks Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber security consultant Parminder Saini and Paladion’s top cyber security expert Jose Varghese decode the MDR framework to help you under...

NotPetya: Ransomware Or a Cyber Attack in Disguise
NOTPETYA: RANSOMWARE OR A CYBER ATTACK IN DISGUISE
The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the w...

Cybersecurity Tips for IT/OT Networks
CYBERSECURITY TIPS FOR IT/OT NETWORKS
With the growing use of converged IT/OT networks, a number of cybersecurity vulnerabilities and challenges have emerged that many operation managers are still learning to deal with. In this webinar, we share the most important known cybersecurity issues with IT/OT networks, and the latest tips and b...

THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
Email-borne ransomware attacks are on the rise. An average of 4,000+ ransomware incidents have occurred daily since the start of 2016*. What should you do if your organization is hit by ransomware? The key is to have a plan before it happens because the bad guys won’t give you much time to rea...

Locky, WannaCry, now Petya/NotPetya. Is this the new normal in Cyber Security?
LOCKY, WANNACRY, NOW PETYA/NOTPETYA. IS THIS THE NEW NORMAL IN CYBER SECURITY?
What we see is that the cyber arms race continues to evolve. If I were to boil this down to its essence, cyber criminals are combining exploits and attacks in creative ways that are not necessarily brand new, but can be tweaked and combined in new ways to create very effective attacks. Like mixing c...

DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
Motivated hackers will find multiple attack vectors in order to access sensitive data—the crown jewels. A comprehensive preventive strategy is key to slowing down and mitigating damage that might be done by the intruder. While most of these impacted companies were utilizing the latest network ...

After WannaCry: Getting Ahead of Ransomware
AFTER WANNACRY: GETTING AHEAD OF RANSOMWARE
WannaCry is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally. It is imperative for organizations of all types to be prepared to quickly address the growing threats of ransomware. Join Tim Bandos, our Senior Director of...

The Impact of Ransomware & How to Defend Against It
THE IMPACT OF RANSOMWARE & HOW TO DEFEND AGAINST IT
Ransomware attacks have been an ongoing concern since they first emerged as a threat in the mid-2000s and this method of extortion has continued to wreak havoc on individuals and businesses alike across the globe.  Last year saw a prolific increase in the number of new ransomware families and 2...

WannaCry Ransomware Attack: What to Do Now
WANNACRY RANSOMWARE ATTACK: WHAT TO DO NOW
Find out what you need to know and how to protect your organization against the WannaCry ransomware attack, the largest coordinated cyber attack of its kind. WannaCry has already crippled critical infrastructure, multiple hospitals and telecommunications organizations, infecting hundreds of thousand...

Orchestrate Your Security Defenses with Threat Intelligence
ORCHESTRATE YOUR SECURITY DEFENSES WITH THREAT INTELLIGENCE
Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it’s difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to ide...

Insiders and Smart Attackers: How to Track & Stop the Rogue
INSIDERS AND SMART ATTACKERS: HOW TO TRACK & STOP THE ROGUE
Despite some of the most noted ‘leakers’ now having served their punishments, the insider threat still looms large over industry as the hardest to detect with the potential to cause the most damage, providing a dire consequence for a company to find itself in. Whether it is an insider go...

A Look at the WannaCry Aftermath and Ways to Prevent Recurrences with IBM MaaS360 with Watson
A LOOK AT THE WANNACRY AFTERMATH AND WAYS TO PREVENT RECURRENCES WITH IBM MAAS360 WITH WATSON
The WannaCry ransomware attack has come – but not yet gone – as organizations continue to struggle with its destructive fallout across 150 countries and over 200,000 endpoints. A hard lesson learned: this massive threat was wholly preventable. Moving forward, enterprises need the right h...

Battling Unknown Malware With Machine Learning
BATTLING UNKNOWN MALWARE WITH MACHINE LEARNING
CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addit...

Security at Speed: Integrating AppSec into the Tools you Already Use
SECURITY AT SPEED: INTEGRATING APPSEC INTO THE TOOLS YOU ALREADY USE
Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community. Join us for a webinar a...

Cyberattacks: Why Mid-Market Companies Believe They
CYBERATTACKS: WHY MID-MARKET COMPANIES BELIEVE THEY'RE SAFE - BUT AREN'T
A recent Arctic Wolf study found a prevalent cybersecurity dissonance between perception and reality, in which most companies believe that they are more cybersecure than they actually are. This is especially dangerous for mid-market companies, which face the same cyberthreats and issues but with few...

Ransomware from a Hacker’s Perspective
RANSOMWARE FROM A HACKER’S PERSPECTIVE

As last weeks global Wannacrypt cyber attack has shown, Ransomware has indeed matured and its impact on business has grown exponentially.  In the last week alone hackers encrypted hundreds of thousands of files across hundreds of countries globally, incapacitating users and taking whole...

Stop Attackers from Phishing Your Inbox for Good
STOP ATTACKERS FROM PHISHING YOUR INBOX FOR GOOD
Inbound email is the primary source of phishing attacks that lead to breaches like ransomware, BEC attacks, malware and credential harvesting. Area 1 Security locks down your email to keep your organization safe from hacks where current secure email gateways and anti-spam filters fail. This webinar ...

Dealing with Skills Gap in Cyber Security
DEALING WITH SKILLS GAP IN CYBER SECURITY
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Buildin...

WannaCry: Inside the Next Generation of Malware Attacks
WANNACRY: INSIDE THE NEXT GENERATION OF MALWARE ATTACKS
In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future NSA-inspired outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them. We will in...

Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
ANATOMY OF THE ATTACKS: WANNACRY RANSOMWARE & GOOGLE OAUTH PHISHING
On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the info...

Lessons Learned From the Hack of the DNC and Other Incidents
LESSONS LEARNED FROM THE HACK OF THE DNC AND OTHER INCIDENTS
The cause and consequence of several pivotal hacking incidents. What attack tradecraft and techniques will trickle down to the consumer attack community. What you can do to prevent incidents from causing major disruptions in your organization. As we have often heard, "Those who cannot remember ...

Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
ENHANCING YOUR SECURITY INFRASTRUCTURE WITH INFOBLOX THREAT INTELLIGENCE
If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that ...

Prepare for the Imminent Shifts in Endpoint Attacks
PREPARE FOR THE IMMINENT SHIFTS IN ENDPOINT ATTACKS
Ransomware is the latest tool being utilized by cybercriminals to monetize everyday security flaws, and it's causing huge headaches for organizations everywhere. However, the techniques leveraged by ransomware can be tackled – and the probability of an infection dramatically reduced &ndash...

Latest Malware Trends & Attack Vectors
LATEST MALWARE TRENDS & ATTACK VECTORS
In this webinar, Richard Cassidy, Technical Director EMEA, and (ISC)² EMEA Managing Director, Adrian Davis will discuss the latest malware trends and attack vectors. The most reported cyber-criminal groups, the latest attack trends (like WannaCry), and best practices for fighting the adversary ...

DDoS: how to counter the new threats we
DDOS: HOW TO COUNTER THE NEW THREATS WE'RE SEEING IN 2017
The largest Distributed Denial of Service (DDoS) attack doubled in size over the last year. They’re now bigger, more complex, and require more expertise and tools to defend against than in the past. What action do you need to make it harder for an attacker to render your network unresponsive?&...

Improving Cybersecurity Posture While Staying on Budget
IMPROVING CYBERSECURITY POSTURE WHILE STAYING ON BUDGET
Nuspire's Shannon Culp and Dan Hoban discuss planning and prioritizing security projects, staying on top of the ever-changing threat landscape, and staying on track with your budget while doing so.

Don
DON'T CRY OVER WANNACRY RANSOMWARE
Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.Join us to learn what Symantec customers and non-customers can do against this threat and future threats ...

Trends Behind Today
TRENDS BEHIND TODAY'S BREACHES & CYBER ATTACKS IN EMEA
Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks. Register today and get insights into: New phishing trends breaching today’s companies. Changes in modern at...

A Guide to Predicting Cyber Attacks
A GUIDE TO PREDICTING CYBER ATTACKS
The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from t...

From Targeted to Distributed - Raise your Defenses Against Ransomware and Modern Malware
FROM TARGETED TO DISTRIBUTED - RAISE YOUR DEFENSES AGAINST RANSOMWARE AND MODERN MALWARE
Modern malware has evolved and mutated to be hard to detect, defend and protect against. Now to be sure that you are protected from the most common threat you need the best level of security, and is endpoint security like anti-malware really keeping up?While statistics show that worms such as Confic...

Bigger Isn
BIGGER ISN'T ALWAYS BETTER: ASSESSING CYBER RISK TO REDUCE YOUR ATTACK SURFACE
Ransomware, spear phishing and third party breaches have become a huge problem as organizations become more connected online and expand their cyber footprint. When even the largest and most sophisticated global organizations, government agencies, and multinational banks are routinely penetrated and ...

What Every CIO Needs to Know About Technology Risk and Cybersecurity
WHAT EVERY CIO NEEDS TO KNOW ABOUT TECHNOLOGY RISK AND CYBERSECURITY
Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk tha...

Have you been affected by the cyber attack?
HAVE YOU BEEN AFFECTED BY THE CYBER ATTACK?
PowerON recently shared a blog ‘WannaCry NHSCyberAttack and what can be done to prevent or mitigate’ where Steve Beaumont discusses how the attack could have been avoided (hindsight is a wonderful thing) and the Microsoft solutions available to help eliminate future risks. For those inte...

Exploits: How they work and how to crush them
EXPLOITS: HOW THEY WORK AND HOW TO CRUSH THEM
Geared for the IT administrator, but open to anyone interested in cyber security. What are exploits? How do they work? What makes them so dangerous? And what can be done to protect your users and network against exploit-based attacks? Learn this and more as Malwarebytes researchers tackle one of the...

An Inside View of a Zero-Day Campaign
AN INSIDE VIEW OF A ZERO-DAY CAMPAIGN
At a recent SC Congress eSymposium, Malwarebytes' malware crushing experts delivered an insightful look inside a zero-day malware attack campaign. Since traditional anti-virus approaches leverage lists of known malware to protect against attacks, they can become minimally effective at protecting...

Protecting Your Endpoint From Data Loss and Malware Attacks
PROTECTING YOUR ENDPOINT FROM DATA LOSS AND MALWARE ATTACKS
Learn how Dell EMC is helping customers protect endpoint data from data loss and attacks through using the Mozy backup solution. Many small to large customers use Mozy to protect critical information stored at the edge. Here are some of the things that will be covered in the session. What is Mozy on...

CYBER THREATS FOR MSPS TO WATCH IN 2017
CYBER THREATS FOR MSPS TO WATCH IN 2017
This webinar will cover: The collection of threat intelligence and its importance in combating cyber threats. Which threats are likely to be seriously problematic - and dangerous for MSPs - through 2017 . What businesses need to know about the threat landscape . The resources and tools that MSPs can...

The Role of Ethical Hacking in Cyber Security
THE ROLE OF ETHICAL HACKING IN CYBER SECURITY
Hacking isn’t inherently bad and comes in many colors: black, white, and all shades in between. Cybersecurity relies on white hat hackers. “White hat” or Ethical Hacking is key to strengthening network security. It also involves thinking like a “black hat” hacker (those...

CyberSecurity: What You Need to Know for 2017?
CYBERSECURITY: WHAT YOU NEED TO KNOW FOR 2017?
In this webinar, our security expert, Sam Cattle will bring you up to speed on the latest in security while exploring software updates and technologies from Dell EMC. He also discusses best practices for employee training. This is a great webinar to watch before you head to the RSA Conference 2017.

Cybersecurity for Small Businesses: Cyber Threats, Security Best Practices & Resources
CYBERSECURITY FOR SMALL BUSINESSES: CYBER THREATS, SECURITY BEST PRACTICES & RESOURCES
Today there is report after report of a high profile cyber attack or breach. Hackers are getting more bold and small businesses are fast becoming prime targets for these attacks. Cybersecurity: It's Your Business" reviews: Cyber Threats Actors, Types of Cyber Threats, Reasons Hackers Target...

Psychological Warfare: How CyberCriminals Mess With Your Mind
PSYCHOLOGICAL WARFARE: HOW CYBERCRIMINALS MESS WITH YOUR MIND
Today’s cyber attacks utilize themost complex threat technologies to infiltrate users' computers. Yet much ofthe danger actually lies outside of the code. When attackers combine atechnological attack with psychology—a social engineering tactic similar toadvertising—their reach ...

Launch, Detect, Evolve: The Mutation of Malware Webinar
LAUNCH, DETECT, EVOLVE: THE MUTATION OF MALWARE WEBINAR
In order to hit their targets, malware developers need to constantly evolve their tactics. This evolution is frequently done in very small incremental changes to known malware attacks. Today, malicious developers know their malware has a short half-life before detection. In order to optimize their e...

2015: The Year of the Flash Zero-Days
2015: THE YEAR OF THE FLASH ZERO-DAYS
Throughout 2015, there seemed to be a never ending exploit of Adobe Flash. Every time a patch was released, cybercriminals found another security hole. And IT admins everywhere struggled to keep pace with the patches.

How Malware Evades Common Prevention Solutions
HOW MALWARE EVADES COMMON PREVENTION SOLUTIONS
The continual evolution of cyber threats provides a challenge to accepted security controls and prevention solutions. In this webinar, we examine the question – are the measures you have implemented enough to keep your assets safe? Topics covered include anti-virus and sandbox concepts, and th...

Learning How Hackers Hack
LEARNING HOW HACKERS HACK
Placing yourself in the shoes of a hacker and attacking your own computer systems is likely the most effective way of uncovering your security vulnerabilities. Penetration testing or pen testing helps organizations to probe their own systems for weaknesses that could lead to a breach.

Shut Down Mirai and DDoS Attacks on Your Organization
SHUT DOWN MIRAI AND DDOS ATTACKS ON YOUR ORGANIZATION
Mirai botnet attacks continue to rise, using IoT devices to flood targeted websites in order to overload servers and disrupt service. These Mirai-infected devices have been uncovered in 164 countries, successfully attacking several organizations.

The Anatomy of a Phishing Attack
THE ANATOMY OF A PHISHING ATTACK
Phishing attacks account for the vast majority of all cybercrime and is by far the most lucrative. Tens of millions of phishing e-mails are sent annually and because of the improved sophistication of both the appearance and technology of the messages, users are being tricked more than ever.

How to Recognize and Prevent Social Engineering Attacks
HOW TO RECOGNIZE AND PREVENT SOCIAL ENGINEERING ATTACKS
Social engineering is nothing new. From the Trojan Horse that collapsed Troy to Frank Abagnale's famous deceptions portrayed in the film Catch Me If You Can, conmen and hackers have preyed on people’s innate tendency to trust. We invite you to listen in as internationally recognized techno...

Strengthen Your Human Firewall with Social Engineering Awareness Training and Simulated Phishing Tests
STRENGTHEN YOUR HUMAN FIREWALL WITH SOCIAL ENGINEERING AWARENESS TRAINING AND SIMULATED PHISHING TESTS
Social engineering is the number one security threat to any organization, making your employees the weakest link in your IT security. Learn how the TracePhishing Simulator: Strengthens your organization's human firewall by leveraging TraceSecurity's best-practice methodology.

MIB Hosting Social Engineering Webinar
MIB HOSTING SOCIAL ENGINEERING WEBINAR
Ethical Hacker, Information Security Expert, Penetration Tester and Social Engineer Steve Stasiukonis will explain the numerous ways business network can be compromised.The presentation will explain Social Engineering techniques and how white-collar criminals leverage the use of common people, proce...

Social Engineering and Email Security Survey
SOCIAL ENGINEERING AND EMAIL SECURITY SURVEY
How Prepared is Your Enterprise to Defend Against Targeted Socially-Engineered Attacks? 46% of surveyed security leaders say their organizations have been victimized by at least one socially-engineered attack in the past year.

How to Respond to Cybersecurity Incidents Faster, Smarter, Better
HOW TO RESPOND TO CYBERSECURITY INCIDENTS FASTER, SMARTER, BETTER
This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation – aligning security teams’ people, process, and technologies into a single hub for incident response.

3 Key Trends in Application Security, feat. Forrester
3 KEY TRENDS IN APPLICATION SECURITY, FEAT. FORRESTER
Even though attacks on Web applications account for only 8% of reported security incidents, they account for 40% of breaches – the single biggest layer of data loss. So, what are organizations doing today to protect their applications?

Main Cyber Attack Destinations in 2016
MAIN CYBER ATTACK DESTINATIONS IN 2016
The big story for Q1 2016 in the digital identity network is that although authentication continues to be a key imperative for global digital businesses, attacks are evolving and becoming more pernicious and hugely widespread, including more mobile attacks than ever before. In Q1 alone, 411 million ...

What Suppliers Don
WHAT SUPPLIERS DON'T TELL YOU ABOUT SECURITY?
When parts of a business process are outsourced, how can you as a customer assess that your supplier provides secure services? Of course, certification of their security management process gives some trust, but control is better. This presentation is about a practical approach to check vendor securi...

A Team-Based Approach to CyberSecurity
A TEAM-BASED APPROACH TO CYBERSECURITY
In this webinar we discuss techniques for empowering your organization, security teams – through executives, with the information the organization needs to combat cyber criminals and respond when the inevitable breach occurs.CyberSecurity breaches mean big losses for companies, including headl...

How to improve resilience and respond better to Cyber Attacks with ISO 22301?
HOW TO IMPROVE RESILIENCE AND RESPOND BETTER TO CYBER ATTACKS WITH ISO 22301?
Main points covered: Can cyber-attacks and information security breaches can impact your business continuity? How you can use your business continuity and incident management plans to effectively respond to cyber-attacks; and How ISO 22301 will ensure that you have effective plans in place and can i...

Surviving the OCR Cybersecurity & Privacy Pre-Audit
SURVIVING THE OCR CYBERSECURITY & PRIVACY PRE-AUDIT
Much like JACHO, the OCR has been auditing the privacy and security policies of healthcare organizations in a proactive manner. Many healthcare organizations are surprised to learn that they are not prepared to successfully get through an OCR pre-audit. Thankfully getting your house in order isn&rsq...

NSA Hacking Tools Exposed Pt 2: Are You Protected?
NSA HACKING TOOLS EXPOSED PT 2: ARE YOU PROTECTED?
The ‘Shadow Brokers’ have recently released a new cache of malware exploits into the wild in which our NSF Threat Intelligence Researchers were able to reverse engineer and ‘sandbox’ for analytical purposes. With this noted, very sophisticated malware strains developed at the...

The difference between Cybersecurity and Information Security
THE DIFFERENCE BETWEEN CYBERSECURITY AND INFORMATION SECURITY
Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of information technology (IT).

4 Pillars Every Organization Needs When Implementing Cybersecurity Strategies
4 PILLARS EVERY ORGANIZATION NEEDS WHEN IMPLEMENTING CYBERSECURITY STRATEGIES
The webinar provides insightful information on the most significant cyber security strategies that every organization needs, in order to respond effectively and professionally to cyber threats. In addition, building a culture of safety in your organization is the key to protecting the integrity of a...

6 Steps to Secure Your Organization from Cybersecurity Threats
6 STEPS TO SECURE YOUR ORGANIZATION FROM CYBERSECURITY THREATS
This webinar will deliver exclusive information on the international best practices in securing the integrity of organizations from cyber-attacks. Get to know in details on how to apply proper security measures and secure your organization from cybersecurity threats.

MCG Cybersecurity Webinar: Risk Management for Small Business
MCG CYBERSECURITY WEBINAR: RISK MANAGEMENT FOR SMALL BUSINESS
Learn the five steps all businesses must follow to protect themselves from costly data breaches. This will be the first of a monthly series to educational webinars for small business leaders. Knowing is the first step in protecting your business.

National Small Business Week with Vision Computer Solutions: Cyber Security 101
NATIONAL SMALL BUSINESS WEEK WITH VISION COMPUTER SOLUTIONS: CYBER SECURITY 101
National Small Business Week is an annual week aimed at small and medium-sized business growth in all industries. In an effort to amplify National Small Business Week in Michigan. Vision Computer Solutions took part in a series of three 30-minute webinars to Michigan Chamber Partners all across the ...

Digital Fire Cyber Security Webinar
DIGITAL FIRE CYBER SECURITY WEBINAR
Have you taken a step back to look at your business’ IT security plan? Do you have the proper measures in place to prevent an attack? Do you have proper network security? I bet you are thinking there is no way your business is at risk.

GROWING CYBERSECURITY THREATS TO THE ENERGY AND INDUSTRIAL SECTORS
GROWING CYBERSECURITY THREATS TO THE ENERGY AND INDUSTRIAL SECTORS
Learn about the most high-profile attacks on energy and industrial sectors and how they were executed. THE IMPACT Explore the strategies employed by different actors to infect machines, disrupt business functions, and compromise intellectual property.

HOW HACKERS EXPLOIT WEAK PASSWORDS
HOW HACKERS EXPLOIT WEAK PASSWORDS
Learn How You Can Help Your Organization Manage Passwords and Avoid Catastrophic Data Breaches.

Phishing 101: Don
PHISHING 101: DON'T TAKE THE BAIT
Learn how to spot the signs of an attack. Get to know the various types of phishing campaigns. Understand who is being targeted & why.

2017 Top 5 Cybersecurity Threats
2017 TOP 5 CYBERSECURITY THREATS
Discover the Most Dangerous Cybersecurity Threats of The New Year. Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research and operations for NopSec. Michelangelo holds numerous professional certifications in information security including CISSP, CISA...

Cyber security and process network control for internal auditors
CYBER SECURITY AND PROCESS NETWORK CONTROL FOR INTERNAL AUDITORS
When it comes to cyber security, it is not just the financial systems that you need to worry about. The risk is far greater on the operational side, terrorists and criminals can attack your business and they can do it online. If terrorists accessed a chemical or nuclear plant then catastrophic damag...

Black Hat 2015 Findings – Staying Ahead of Malware
BLACK HAT 2015 FINDINGS – STAYING AHEAD OF MALWARE
2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.

Asymmetric Resilient Cybersecurity
ASYMMETRIC RESILIENT CYBERSECURITY
We are delivering the theory, processes, methodologies, and algorithms that will enable a resilient cyber infrastructure with an asymmetric advantage to thwart adversaries who seek to infiltrate and damage our national security through digital means.

Cyber Attack Trends 2017 and Beyond: Protecting Your Business in Cyberspace
CYBER ATTACK TRENDS 2017 AND BEYOND: PROTECTING YOUR BUSINESS IN CYBERSPACE
As the scale and sophistication of cyber-attacks increases, coupled with new legislation and the complexity of technology, businesses need to manage risk in ways beyond those traditionally handled by the information security function.

2017 Threat Landscape: Increased Sophistication, or More of the Same?
2017 THREAT LANDSCAPE: INCREASED SOPHISTICATION, OR MORE OF THE SAME?
As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and threats. So what are the key takeaways and how can global security events from the past 12 months inform your plans for 2017.

Mobile Security: 2016 Wrap-Up and 2017 Predictions
MOBILE SECURITY: 2016 WRAP-UP AND 2017 PREDICTIONS
2016 has been a fully packed year for mobile security, with the first major public exposure of sophisticated state-sponsored cyber espionage, and the evolution of mobile spyware technology for corporate espionage.

Mobile Security Threats & ESET Endpoint Security for Android
MOBILE SECURITY THREATS & ESET ENDPOINT SECURITY FOR ANDROID
Looking to improve mobile device security, protect remote workers and reduce costs? Then join this webinar detailing how ESET endpoint security for Android can handle all the latest threats—without the need for a costly MDM system.

Next-level mobile app security: A programmatic approach
NEXT-LEVEL MOBILE APP SECURITY: A PROGRAMMATIC APPROACH
Name a mobile app security challenge and chances are Katie Strzempka, VP Customer Success and Services at NowSecure, has developed and implemented a solution. Fresh off the publication of her Mobile App Security Program Management Handbook, Katie will share her experiences helping numerous enterpris...

Three Secrets to Becoming a Mobile Security Superhero
THREE SECRETS TO BECOMING A MOBILE SECURITY SUPERHERO
Learn how to become the mobile security superhero at your company by following these 3 steps:  Prove to your management that mobile security threats are real by showing real examples. Review the SANS Institute checklist to help choose the right mobile threat defense solution.

Intelligent Security: Balancing Information Security Risks and Priorities
INTELLIGENT SECURITY: BALANCING INFORMATION SECURITY RISKS AND PRIORITIES
As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to p...

Stroke of genius; The only known way to fully protect against keystroke loggers
STROKE OF GENIUS; THE ONLY KNOWN WAY TO FULLY PROTECT AGAINST KEYSTROKE LOGGERS
Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other ...

Dealing with DDoS Application Threats in Mobile Networks
DEALING WITH DDOS APPLICATION THREATS IN MOBILE NETWORKS
The publicity given to devastating cyber-attacks on companies like Sony Pictures leads some mobile operators to believe that the uniqueness of the mobile network, service and device environment means they are nowhere near as vulnerable to DDoS and Advanced Persistent Threats (APT). Leveraging Heavy ...

Making Cybersecurity Manageable with High-Fidelity Security
MAKING CYBERSECURITY MANAGEABLE WITH HIGH-FIDELITY SECURITY
The volume and sophistication of IT threats is putting unprecedented pressure on security teams. With limited time and manpower, security teams need the right combination of visibility, intelligence and context to find threats in real-time before damage is done.

How to detect hidden cyberattack communications inside today’s networks
HOW TO DETECT HIDDEN CYBERATTACK COMMUNICATIONS INSIDE TODAY’S NETWORKS
Today’s cyber attackers survive by hiding their attack communications from the prying eyes of security. It’s a critical part of their attack arsenal and it lets them patiently manage and propagate attacks throughout your network, undetected.

Automatically quarantine endpoints based on network attack behavior detections
AUTOMATICALLY QUARANTINE ENDPOINTS BASED ON NETWORK ATTACK BEHAVIOR DETECTIONS
Join Albert Caballero, chief information security officer for HBO Latin America, to learn how to automatically pivot from real-time attack behavior detections in the Vectra UI to Carbon Black Response to expedite forensic investigation and isolate compromised hosts.

2017 Phishing Trends & Intelligence Report
2017 PHISHING TRENDS & INTELLIGENCE REPORT
The PhishLabs 2017 Phishing Trends and Intelligence Report reveals a profound shift in the overall cyber threat landscape. During this webinar, Senior Security Threat Researcher, Crane Hassold, goes into detail about widespread login practices that have left most industries and consumers vulnerable ...

Dridex: Chasing a Botnet from the Inside
DRIDEX: CHASING A BOTNET FROM THE INSIDE
In light of recent news about Dridex takedown, AnubisNetworks Labs team would like to take this webinar to share with the community some of the efforts undertaken during this investigation led by the NCA, with our participation, to track this malware and exploit its communication channels.In March 2...