home.aspx
 
.

Webinars

How To Create a Successful Cyber-Security Policy
HOW TO CREATE A SUCCESSFUL CYBER-SECURITY POLICY
As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security po...

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist
PRIVATE EQUITY CYBERSECURITY: PRELIMINARY LOOK AT EXCLUSIVE COMPLIANCE CHECKLIST
Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all web...

3 Flaws with the Defense-in-Depth Security Model and How to Improve It
3 FLAWS WITH THE DEFENSE-IN-DEPTH SECURITY MODEL AND HOW TO IMPROVE IT
Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without ...

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense
YOUR NETWORK NEEDS TO BE THE FIRST AND LAST LINE IN YOUR CYBER-SECURITY DEFENSE
Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge.  In this webinar, we will take a look...

Approaching Cyber Security Vendor Selection in OT Environments
APPROACHING CYBER SECURITY VENDOR SELECTION IN OT ENVIRONMENTS
Operational Technology (OT) and ICS environments present unique challenges for the selection of security solutions. Join ARC Advisory Group Vice President of Research, Larry O’Brien as he shares his recommendations for cyber security vendor selection in the ICS and OT worlds.

What MSPs Need to Know to succeed in the Cloud Security Market
WHAT MSPS NEED TO KNOW TO SUCCEED IN THE CLOUD SECURITY MARKET
Cloud security is the number one skill and need required in the vast cloud market landscape.  The latest data in CompTIA’s 2018 cloud research shows that cloud has officially reached the mainstream. Here are some of the latest stats: 91% of enterprises and corporations are using cloud sol...

Why Security Is a Team Sport
WHY SECURITY IS A TEAM SPORT
Recently, U.S. Cert warned that global threat actors are actively targeting managed service providers. Clearly, MSPs are on the front line. We’re being asked to take on a more active security role than ever before. However, many MSPs lack the internal resources and skillsets to embrace a full-...

2018 Cybersecurity Headlines in Review
2018 CYBERSECURITY HEADLINES IN REVIEW
2018 was a particularly busy year for the cybersecurity industry… Beyond the exponential growth in the number and types of cyber-attacks—including Magecart, which compromised the payment processing systems for a number of large companies—hundreds of new cybersecurity startups were...

The Five Pillars of Data Governance 2.0 Success
THE FIVE PILLARS OF DATA GOVERNANCE 2.0 SUCCESS
What’s the state of data governance readiness within your organization? Do you have an executive sponsor? Is a standard definition understood across the enterprise? How does your IT team view it? How does your organization approach analytics, business intelligence and decision-making? Have you...

3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools
3 CHALLENGES OF THREAT HUNTING USING ENDPOINT DETECTION (EDR) TOOLS
In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and ...

New Ransomware Report: Learn how to protect your clients and expand your practice in 2019
NEW RANSOMWARE REPORT: LEARN HOW TO PROTECT YOUR CLIENTS AND EXPAND YOUR PRACTICE IN 2019
Ransomware attacks aren’t decreasing among small and midsize customers. According to Datto’s annual State of the Channel Ransomware Report, 79 percent of MSPs reported ransomware attacks against SMBs from Q2 2016 – Q2 2018. And in the first half of 2018 alone, 55 percent reported a...

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad
CYBER THREATS TO WATCH IN 2019: KEY TAKEAWAYS FROM OUR WEBINAR WITH THE FBI CYBER SQUAD
The fines coming from the E.U.’s General Data Protection Regulation (GDPR) legislation are going to be doled out throughout 2019, which also means there will be a lot more reporting of these breaches in mainstream media outlets. However, if companies are transparent with GDPR investigators the...

How Security Services Fuel Growth for MSPs
HOW SECURITY SERVICES FUEL GROWTH FOR MSPS
Faced with modern cyber threats, your clients’ security requirements are changing by the minute. To ensure the highest levels of service and security, MSPs like you need to understand, meet, and exceed those requirements—and you have to do it better than your competition can. Join this w...

Tackling Complexity: 3 Tips for Effective Endpoint Security
TACKLING COMPLEXITY: 3 TIPS FOR EFFECTIVE ENDPOINT SECURITY
Remote locations, limited bandwidth, and network connectivity issues complicate efforts to discover and report endpoint hygiene data. Inconsistent or manual patching often results in persistent, unidentified vulnerabilities and non-compliant endpoints. Use of multiple, non-integrated tools to gather...

State of the Internet Security Report
STATE OF THE INTERNET SECURITY REPORT
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the at...

Take Your Security With You From On-Premises to the AWS Cloud
TAKE YOUR SECURITY WITH YOU FROM ON-PREMISES TO THE AWS CLOUD
Find out all the benefits of using one security solution across your on-premises data center and AWS cloud workloads. Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to pr...

The rise of privacy: a risk-based approach to privacy oversight, compliance and management
THE RISE OF PRIVACY: A RISK-BASED APPROACH TO PRIVACY OVERSIGHT, COMPLIANCE AND MANAGEMENT
With GDPR in force and Google and Facebook facing massive lawsuits, organizations face mounting pressure to demonstrate they are safeguarding private information. Recent hearings on enacting U.S. privacy legislation and California’s privacy law only serve to heighten the need for organizations...

Managing cyber threats: Developing a sustainable cybersecurity program to address your unique risks
MANAGING CYBER THREATS: DEVELOPING A SUSTAINABLE CYBERSECURITY PROGRAM TO ADDRESS YOUR UNIQUE RISKS
Organizations face increasing risks and threats to their customer, financial, operations and other data, processes and systems. It is vital to achieve balance between the need to safeguard information, minimize disruption in case of an attack or breach, provide transparency and manage a sustainable ...

Lessons Learned from Recent Cyber Incidents: Google Plus, Facebook, Reddit, and What You Need to Know
LESSONS LEARNED FROM RECENT CYBER INCIDENTS: GOOGLE PLUS, FACEBOOK, REDDIT, AND WHAT YOU NEED TO KNOW
Join Raj Bakhru, Partner at ACA Aponix, on Tuesday, November 27 at 11:00am ET as he examines recent high-profile breaches involving Google Plus, Facebook, Reddit, British Air, and Colorado Timberline, and others. Raj will discuss what your firm can learn from these incidents, key protections you can...

HOW TO OVERCOME CHALLENGES IN SECURING MODERN CLOUD ENVIRONMENTS
HOW TO OVERCOME CHALLENGES IN SECURING MODERN CLOUD ENVIRONMENTS
As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about the security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies. Traditional security tools are ...

The Next Cyber Threat Is Already In Your Network
THE NEXT CYBER THREAT IS ALREADY IN YOUR NETWORK
While many people focus on detecting the next cyber threat to wreak havoc, more attention should be paid to detecting precursors to attacks that may already be within your network. In many major attacks, malware and vulnerabilities dwell within networks for months or years before the full exploit is...

Using Open Source Libraries to Speed Development Whilst Minimising Risk
USING OPEN SOURCE LIBRARIES TO SPEED DEVELOPMENT WHILST MINIMISING RISK
Better, faster, cheaper. these are the promises of DevOps. The future of software development and operations is all about speeding up development and deployment, aided and abetted by cloud-based infrastructure, RESTful APIs and indeed, open source software. But then comes security, which requires a ...

Can We Protect Critical Infrastructure from Cyberattacks?
CAN WE PROTECT CRITICAL INFRASTRUCTURE FROM CYBERATTACKS?
Cyberattacks have sharply increased against critical infrastructure globally, impacting power plants, water treatment facilities, oil & gas refineries and many more. Attacks include StuxNet, HaveX, Industroyer, Black Energy, and Triton, all using advanced hacking techniques that attack memory to...

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk
WEBINAR ON THE SAFETY ACT AND CYBERSECURITY: PROTECTING YOUR REPUTATION AND REDUCING LIABILITY RISK
In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack. ...

Getting More From Less: 4 Ways Replacing AV with a Security Platform Can Help You
GETTING MORE FROM LESS: 4 WAYS REPLACING AV WITH A SECURITY PLATFORM CAN HELP YOU
The threat landscape is growing increasingly sophisticated and is bypassing traditional antivirus. To combat this IT and security professionals are adding products to their security stack. 48% of organizations are using more than 25 different discrete or point security tools to manage, investigate, ...

The Memory Attack Battleground
THE MEMORY ATTACK BATTLEGROUND
Recent cyberattacks have use sophisticated fileless techniques and target applications in process memory, making them largely invisible to conventional security products. WannaCry, Petya/NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to break into networks and s...

Can We Rein in the Global Cybersecurity Crisis?
CAN WE REIN IN THE GLOBAL CYBERSECURITY CRISIS?
The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated ...

Learning to Win: Making the Case for Autonomous Cyber Security Solutions
LEARNING TO WIN: MAKING THE CASE FOR AUTONOMOUS CYBER SECURITY SOLUTIONS
Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution is particularly relevant to cyber security, where machine learning is used to help human analysts make sense of increasingly large amounts of data to identify...

Operational Technology Risk Assessment
OPERATIONAL TECHNOLOGY RISK ASSESSMENT
Historically, an organization developed a Cybersecurity program to achieve compliance. It has been our experience, organizations which achieve full compliance cannot continue to operate because of strict Compliance requirements and the lack of a functional Cybersecurity program. The lack of a functi...

Protecting Our 9-1-1 Centers From Targeted Cyber Attacks
PROTECTING OUR 9-1-1 CENTERS FROM TARGETED CYBER ATTACKS
Over the last several months we have discussed a variety of attacks:  Ransomware, Cryptojacking, Advanced Persistent Threats, DDoS/TDoS and others. We’ve seen criminals and state actors use these techniques for targeted attacks against our public safety infrastructure. In this webinar, we...

HOW TO FIGHT SECURITY FATIGUE IN YOUR ENTERPRISE
HOW TO FIGHT SECURITY FATIGUE IN YOUR ENTERPRISE
Your most critical stakeholders are prone to security fatigue: the executive team (or board) and the co-workers that you’re tasked to protect. Your success is tied to your ability to establish and maintain credibility with your stakeholders while also protecting your business. How do you ensur...

Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
BEYOND S3 BUCKETS - EFFECTIVE COUNTERMEASURES FOR EMERGING CLOUD THREATS
Research shows that 25% of organizations have cryptojacking activity in their AWS, Azure, and GCP environments. Is yours one of them? While S3 buckets continue to dominate headlines, cryptojacking and other threats lay quietly behind the scenes. Learn about the latest cloud threats and arm yourself ...

Operationalizing Data For Fraud Investigations
OPERATIONALIZING DATA FOR FRAUD INVESTIGATIONS
Security and Fraud teams are swimming in data. Data is not the problem, but operationalizing and making use of the data we have is, especially when it comes to fraud prevention. Join Chip Witt, head of product at SpyCloud, and Security Boulevard Managing Editor Charlene O'Hanlon for a lively dis...

All Your Network Traffic Are Belong to Us – VPNFilter Malware and Implications for ICS
ALL YOUR NETWORK TRAFFIC ARE BELONG TO US – VPNFILTER MALWARE AND IMPLICATIONS FOR ICS
The world recently learned of new multi-stage router malware with destructive capabilities and the ability to intercept web traffic and insert malicious code into it. Described as “an impressive piece of work” by Bruce Schneier, the VPNFilter malware also includes a packet sniffer for ca...

The State of Open Source Vulnerabilities Management
THE STATE OF OPEN SOURCE VULNERABILITIES MANAGEMENT
The number of open source vulnerabilities hit an all-time record in 2017 with 3,500 reported vulnerabilities - that's 60% higher than the previous year, and the trend continues in 2018.  Since it’s impossible to keep up with today’s pace of software production without open sourc...

12 Ways to Defeat Two-Factor Authentication
12 WAYS TO DEFEAT TWO-FACTOR AUTHENTICATION
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years&rsq...

Embedding Security in a Modern DevOps Pipeline - A Customer
EMBEDDING SECURITY IN A MODERN DEVOPS PIPELINE - A CUSTOMER'S PERSPECTIVE
Embedding Security in a Modern DevOps Pipeline - A Customer's Perspective. Hear directly from a customer’s unique perspective on how Beeline (the world leader in contingent workforce solutions) aligned Development, Operations and Security practitioners to set up a fully automated CI/CD pip...

State of the Internet / Security Report: Latest DDoS and Web App Attack Trends Overview
STATE OF THE INTERNET / SECURITY REPORT: LATEST DDOS AND WEB APP ATTACK TRENDS OVERVIEW
As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks of up to 650 Gbps. Our security experts analyze ...

EVERYTHING I LEARNED & WANTED TO FORGET ABOUT WAFS
EVERYTHING I LEARNED & WANTED TO FORGET ABOUT WAFS
Application security is nothing like it was 25 years ago. Today, almost all enterprise applications have some web-facing component, whether in the form of a pure web-app, cloud application, API, or microservice. Furthermore, attackers have become more efficient, persistent and sophisticated, while a...

Mind the Security Gap: Moving Past Best Practices to Cutting Edge Cyber Security in Accounts Receivable
MIND THE SECURITY GAP: MOVING PAST BEST PRACTICES TO CUTTING EDGE CYBER SECURITY IN ACCOUNTS RECEIVABLE
Given the sensitivity of payment information and the increasing use of technology in accounts receivable, it is vital for businesses to prioritize cybersecurity and privacy. In this webcast you will learn how to: Evaluate your company's cybersecurity health. Secure financial data through cutting...

The Mobile Menace Most Wanted List
THE MOBILE MENACE MOST WANTED LIST
When it comes to mobile security, what you can’t see really can hurt you. In fact, there are seven mobile menaces creeping around your employees’ devices right now just waiting to pounce. And when they do, you better be prepared! This webinar will introduce you to the #1 on the Mobile Me...

Enforcing Immutability and Least Privilege to Secure Containerized Applications on OpenShift
ENFORCING IMMUTABILITY AND LEAST PRIVILEGE TO SECURE CONTAINERIZED APPLICATIONS ON OPENSHIFT
One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do. With immutability, every attempt t...

Fraud in the Travel Sector: Insights from Law Enforcement and Cyber Forensics
FRAUD IN THE TRAVEL SECTOR: INSIGHTS FROM LAW ENFORCEMENT AND CYBER FORENSICS
This webinar will walk you through: How fraudulent booking service advertisements are sold in the online underground forums. The methods criminal actors use to purchase compromised credit cards through various online marketplaces. How criminal networks rely on fraudulent booking services in their op...

Consumer awareness of cyber security in a hyper-connected home
CONSUMER AWARENESS OF CYBER SECURITY IN A HYPER-CONNECTED HOME
Incidents of attacks against smart-home devices are often featured in the media. But what is the consumer’s perception? And who is best positioned to deliver cyber-security services - traditional security vendors or the ISP? To find out, we surveyed 1250 consumers from 10 countries. Discover h...

Can a Corporate Network Get Hacked Via a Smartphone?
CAN A CORPORATE NETWORK GET HACKED VIA A SMARTPHONE?
“Super Company” (a company of about 2,000 employees) conducted a security test, with the help of a penetration (pen) tester, to find ways to steal confidential documents. Unsurprisingly, access to the company's internal network was gained starting from a smartphone. In this on-demand...

Protecting City Government Employees from Mobile Threats
PROTECTING CITY GOVERNMENT EMPLOYEES FROM MOBILE THREATS
Experts indicate that state and local governments are being increasingly targeted because their technology is often times more vulnerable than the private sector’s, they host highly valuable data and they have a limited ability to manage system down time. With limited resources, protecting gov...

HOW TO KEEP FAMILIES CYBER SAFE
HOW TO KEEP FAMILIES CYBER SAFE
In our on-demand webinar, Protecting Your Family’s Online Reputation: A Conversation About Child & Family Social Media Habits, we explore the results of surveys on child and family social media habits, just in time for National Cyber Security Awareness month. Our children are digital nativ...

TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
TRY FALCON PREVENT™ START YOUR 15-DAY FREE TRIAL
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR),and a 24/7 managed hunting service — all delivered ...

Cyber security and the protection of assets
CYBER SECURITY AND THE PROTECTION OF ASSETS
With viewers consuming content on an increasing array of devices and platforms, and the media industry a high-profile target for hackers, the task of protecting assets can be complicated and costly.

Tools and Strategies for Better Cyber Defense
TOOLS AND STRATEGIES FOR BETTER CYBER DEFENSE
Protecting your organization from intensifying cyber threats and attacks requires full visibility into your IT environment and alignment among IT Ops and Security teams. This on-demand webinar presented by Online Business Systems and BMC presents tools and strategies to strengthen cybersecurity.

The Intersection of Cybersecurity and IoT
THE INTERSECTION OF CYBERSECURITY AND IOT
As the Internet of Things (IoT) continues to grow rapidly, how will organizations manage the additional risks that the IoT presents within Cybersecurity? What considerations need to be made in order to address the reality that by 2020, IoT will be in 50% of all new technology? How can you gain more ...

5 Reasons AI is the Pillar of the Next-Gen SOC
5 REASONS AI IS THE PILLAR OF THE NEXT-GEN SOC
SOC processes are broken, enterprises are still at risk and analysts are feeling the cybersecurity job fatigue. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How do you imp...

Security and Governance in the Hybrid Multi-Cloud
SECURITY AND GOVERNANCE IN THE HYBRID MULTI-CLOUD
Hybrid cloud solutions are hailed for their combination of scalability, agility and cost-efficiency of public cloud with the increased security and compliance of keeping sensitive data on-premises under your full control.  However, the responsibility for security is shared between the customer ...

Smarter Endpoint Security How to go Beyond Prevention
SMARTER ENDPOINT SECURITY HOW TO GO BEYOND PREVENTION
Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Some companies tout “next-generation endpoint security,” but what does that mean? Register now for this webinar and you will: Learn about the current endpoint security land...

Setting up a cybersecurity operations centre – TVA shows how
SETTING UP A CYBERSECURITY OPERATIONS CENTRE – TVA SHOWS HOW
A common recommendation for utilities is to develop a cybersecurity operations centre to support its refence strategy and this is the approach that has been taken by the Tennessee Valley Authority (TVA) with the implementation of a state-of-the-art centre within its Chattanooga office complex. &ldqu...

Upgrading to Next-Generation Antivirus (NGAV)
UPGRADING TO NEXT-GENERATION ANTIVIRUS (NGAV)
As threats such as ransomware continue to increase, security executives from Major League Baseball (MLB) and the National Hockey League (NHL) decided to collaborate and upgrade their traditional antivirus to next-gen AV solutions to better protect their organizations. Hear what these major league se...

CONTINUOUS ASSURANCE USING DATA THREAT MODELING
CONTINUOUS ASSURANCE USING DATA THREAT MODELING
Ask most security, risk, governance or assurance practitioners what the single most important consideration for their organizations is and there’s a strong likelihood they will tell you that the answer is “the data”. Professionals continuously assess and evaluate the controls they ...

3 Steps to Gain Control of Cloud Security
3 STEPS TO GAIN CONTROL OF CLOUD SECURITY
The cloud is a notable business advantage, but it does bring numerous security concerns. Among them: Lack of visibility across cloud or between on-premises and cloud environments. Monitoring security controls and changes within cloud and multi-cloud environments. Maintaining compliance by monitoring...

Threat Intelligence, Cover Your Bases!
THREAT INTELLIGENCE, COVER YOUR BASES!
As an analyst, you are pulled in many different directions depending on the urgency of the moment. You can go from detecting threats, to formulating a response plan, to blocking real-time cyber-attacks in the blink of an eye, and that doesn’t even include staying on top of the dynamic threat l...

Cloud Security Strategies for SMBs: Top Trends and Tips
CLOUD SECURITY STRATEGIES FOR SMBS: TOP TRENDS AND TIPS
Small and midsize businesses are rapidly moving to the cloud to reduce infrastructure costs while gaining scalability and efficiency. Email servers, web servers, customer relationship manager systems, and even file storage are migrating to off-site services such as Salesforce, Microsoft Azure, and A...

The GDPR Writing Is On the Wall - Act Now to Avoid the Frenzy
THE GDPR WRITING IS ON THE WALL - ACT NOW TO AVOID THE FRENZY
The General Data Protection Regulation (GDPR) is comprehensive, critical to data security, and coming VERY soon. So, are you ready? Results from WatchGuard’s recent worldwide survey on GDPR readiness indicate that many businesses are waiting… but for what? Organizations with employees o...

The 5 Crazy Mistakes Administrators Make with IoT System Credentials
THE 5 CRAZY MISTAKES ADMINISTRATORS MAKE WITH IOT SYSTEM CREDENTIALS
Managing an IoT system’s cybersecurity can be daunting because it can provide a broad and varied attack surface. You might not even know all of the places where there are credentials—let alone how good those credentials are. Did the installer use the same secret across all of the devices...

BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
BATTLING THE CRYPTOJACKING EPIDEMIC & MALWARE MUTATIONS
Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty. Join this webinar for an in-depth discussion of threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting Syste...

Privileged Passwords are Easy Pickings for Attackers – Unless You Make These Fixes
PRIVILEGED PASSWORDS ARE EASY PICKINGS FOR ATTACKERS – UNLESS YOU MAKE THESE FIXES
For many organizations, passwords are the primary means of defense. Yet, organizations still struggle with a holistic approach to managing authentication—particularly for privileged users and accounts. Part of this challenge stems from internal password sprawl. A perfect example is that of a F...

Improving Cyber Resilience of Critical Infrastructure Providers
IMPROVING CYBER RESILIENCE OF CRITICAL INFRASTRUCTURE PROVIDERS
Cyber attacks waged on the grid and critical infrastructure companies are about the scariest we can all imagine. Yet, they are routinely happening. An attack that lands on its target have the potential to cause almost unfathomable societal disruption. Transportation systems could fail, essential pub...

Challenges and Solutions to Securing Applications By Design
CHALLENGES AND SOLUTIONS TO SECURING APPLICATIONS BY DESIGN
Did you know that you could reduce the costs of remediating application security defects by 75% or more by simply shifting and re-prioritizing key Software Development Lifecycle processes? Applications have become among the most targeted of enterprise assets, and yet a disturbingly large percentage ...

A Higher Education in Network Security
A HIGHER EDUCATION IN NETWORK SECURITY
Join us for a candid look behind the curtain of the NOC (Network Operations Center) for BlackHat, some of the most technical information security events in the world. As the official network provider, Ruckus' success at these events mean that our experience, lessons learned and accolades directl...

Battling Lateral Movement, Counter Incident Response & Island Hopping
BATTLING LATERAL MOVEMENT, COUNTER INCIDENT RESPONSE & ISLAND HOPPING
According to the world’s top incident response (IR) professionals, cyberattackers are honing their ability to remain undetected inside the enterprises they’ve breached and evolving their attacks to counter defenders’ response efforts. Most organizations are unprepared to combat suc...

Advanced cyber intelligence techniques: Integrated security testing
ADVANCED CYBER INTELLIGENCE TECHNIQUES: INTEGRATED SECURITY TESTING
While IT security budgets continue to rise, executive management may not have a solid grasp on cybersecurity readiness or the organization’s overall security posture. It starts with understanding the organization’s attack surface (the internal and external footprint that can be an entry ...

How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes
HOW TO PROTECT BILLIONS AGAINST MOBILE BANKING FRAUD: OPEN YOUR EYES
Mobile banking and trading are the new killer apps. Firms compete to make their mobile user experience a more cost-efficient and user-friendly version of every account interaction traditionally conducted in a physical branch or on a personal computer. Financial service firms are ultimately responsib...

Fight security threats and protect your devices
FIGHT SECURITY THREATS AND PROTECT YOUR DEVICES
From the smallest of smart devices to the largest of servers, every piece of technology which is connected to the internet is exposed to the dangers of being hacked. As a result, IT companies have seen the need to constantly adapt their solutions and develop more intelligent capabilities to cope wit...

Get Smart About Ransomware: Protect Yourself and Your Organization
GET SMART ABOUT RANSOMWARE: PROTECT YOURSELF AND YOUR ORGANIZATION
What would you do if your organization's data was held ransom, and the only way to get it back was to pay someone $17,000? That's exactly what Hollywood Presbyterian Medical Center did earlier this year. Ransomware is a type of malicious software restricting access to a victim’s infect...

The Set-and-Forget Web Application Firewall. with AI
THE SET-AND-FORGET WEB APPLICATION FIREWALL. WITH AI
Learn more about a breakthrough "set-and-forget" web application firewall that combats increasing hacker sophistication and addresses the exhaustive and excessive false positive debacle encountered with traditional WAFs.

Everything or Nothing: The Cyber Wars
EVERYTHING OR NOTHING: THE CYBER WARS
Critical infrastructure is defined as, “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety.&rdquo...

How to Improve Cybersecurity Posture in a Climate of Increasing Regulation
HOW TO IMPROVE CYBERSECURITY POSTURE IN A CLIMATE OF INCREASING REGULATION
You’re invited to join experts from BitSight, the global standard in security ratings, and risk management and compliance leader Opus to explore new ways to manage third party risks and compliance and combat cybercrime — focusing on the landmark New York Department of Financial Services ...

DDoS attacks keep breaking world records
DDOS ATTACKS KEEP BREAKING WORLD RECORDS
Join our 45-minute OnDemand webinar to learn about new threats to your services and about new architectures that can protect them to keep ahead of this shifting landscape. This year DDoS attacks have intensified to become the most destructive malware to hit service providers. Recent attacks have rea...

HOW TO STAY RESILIENT TO BREACHES & AUDITORS
HOW TO STAY RESILIENT TO BREACHES & AUDITORS
The GDPR is Here: How to Stay Resilient to Breaches and Auditors. In this session of our Webinar Wednesday series, Dataguise discusses the General Data Protection Regulation (GDPR) and how organizations can prevent breaches and audits. The presenter explores technology to help enterprise organizatio...

Email: Still A Top Threat Vector!
EMAIL: STILL A TOP THREAT VECTOR!
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including: Why sma...

ARC, Nozomi Webinar on Cybersecurity and IT/OT Convergence
ARC, NOZOMI WEBINAR ON CYBERSECURITY AND IT/OT CONVERGENCE
Convergence of Different Organizations with Different Values. Convergence has obvious implications for cybersecurity. OT’s focus on non-stop operations and eliminating unscheduled downtime is raising the cybersecurity issue on the IT side, and increased data from IT is raising the same issue o...

Ransomware and Other Emerging Threats Within Healthcare Organizations
RANSOMWARE AND OTHER EMERGING THREATS WITHIN HEALTHCARE ORGANIZATIONS
The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actor...

Cybersecurity and Data Privacy Essentials for Financial Service Providers
CYBERSECURITY AND DATA PRIVACY ESSENTIALS FOR FINANCIAL SERVICE PROVIDERS
Join us for a discussion of recent trends and developments in cybersecurity and data protection for the financial services industry. The webinar will focus on issues that small to mid-size firms should be thinking about. In addition to discussing recent developments, we will examine recent guidance ...

Never Trust, Always Verify
NEVER TRUST, ALWAYS VERIFY
The perimeter model of network security is broken – attackers have little difficulty in spoofing IP addresses or piggybacking malicious software on top of policy-permitted network traffic to gain access to the network. And once inside the network, it's a simple task for attackers to move l...

Why Your WAF Will Eventually Fail You
WHY YOUR WAF WILL EVENTUALLY FAIL YOU
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basi...

Navigating a Breach & Activating a Proven Incident Response Plan
NAVIGATING A BREACH & ACTIVATING A PROVEN INCIDENT RESPONSE PLAN
Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterd...

Fortifying Your Organization
FORTIFYING YOUR ORGANIZATION'S LAST LAYER OF SECURITY
Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat...

Information Security Exposures: Creating and Sustaining a Culture of Security
INFORMATION SECURITY EXPOSURES: CREATING AND SUSTAINING A CULTURE OF SECURITY
MGI Worldwide members from across the globe took part in our latest webinar on July 24th, hosted by Founding Partner, Producer and Vice-President Stephen Vono of McGowanPRO. Titled 'Information Security Exposures: Creating and Sustaining a Culture of Security’ the webinar was geared toward...

Matching Application Security to Business Needs
MATCHING APPLICATION SECURITY TO BUSINESS NEEDS
Applications are the #1 attack target of hackers, so application security should be an integral part of your software development tools and processes. At the same time, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself lost in sea of confusing 3 and ...

Why You Should Be Using Deception: Decoys, Honeypots, and Red Herrings
WHY YOU SHOULD BE USING DECEPTION: DECOYS, HONEYPOTS, AND RED HERRINGS
Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys and honeypots can be high-value, low-noise, and identify threats previously thought to be undetectable. Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist,...

Mobile Security On-device or in the Cloud?  Hackers Have a Preference
MOBILE SECURITY ON-DEVICE OR IN THE CLOUD? HACKERS HAVE A PREFERENCE
In today’s cyber environment, detection on-device vs. in the cloud may seem like a tough choice. However, given the speed of attacks, delays of going to the cloud and privacy concerns of end users, the benefits of on-device mobile threat defense far outweigh the cloud. For enterprises with emp...

How’s it Going for Your Endpoint & Mobile Security Projects?
HOW’S IT GOING FOR YOUR ENDPOINT & MOBILE SECURITY PROJECTS?
Now that the privacy policy updates have settled, it’s time to look at how well you adapted to the GDPR mandates. When it comes to your computing endpoints, did you scramble last minute to reach compliance? Or, were your systems built by forward-thinking companies to already include the functi...

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments
ADDRESSING THE EMERGING MOBILE CYBERSECURITY THREATS FACING STATE AND LOCAL GOVERNMENTS
The number and cost of cyber attacks on the public sector is growing. According to Accenture’s 2017 “Cost of Cyber Crime Study,” the average cost of a successful public sector cyber breach in 2017 increased $1.43 million over the previous year to $8.2 million. Experts indicate that...

Here Phishy, Phishy, Phishy!
HERE PHISHY, PHISHY, PHISHY!
Definitionally, phishing is a social engineering attack that tricks users into clicking on a link that takes them to a site that either a) delivers a malicious payload to compromise a device, or b) further tricks them into divulging their credentials. While the former immediately weaponizes the devi...

The State of Mobile Device Threats:  2018 H1 Mobile Threat Report
THE STATE OF MOBILE DEVICE THREATS: 2018 H1 MOBILE THREAT REPORT
Enterprise devices running Zimperium's mobile security detect several types of mobile device risks and threats as they connect around the world. Each of the risks and attacks produces detailed forensics in order to remediate and diagnose each event. Zimperium would like to share the mobile threa...

Hacking Mobile Applications
HACKING MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries inherent and unique threats, and traditional software defences and development methodologies are not sufficient to ...

Threats and Challenges of Mobile Applications
THREATS AND CHALLENGES OF MOBILE APPLICATIONS
As companies consider their mobile application development strategy, they need to assess their internal mobile application development skills and processes. The mobile platform carries unique threats and traditional software defenses are not sufficient to thwart them. In this on demand webinar, Secu...

Security for IBM Cloud
SECURITY FOR IBM CLOUD
Recent headlines have shown that failing to secure cloud applications has dire consequences. Responsibility for securing the cloud lies not only with security teams, but also with DevOps and operations teams who are charged with ensuring appropriate security controls are used. In addition, organizat...

2018 Cyber Security Predictions for an Unpredictable World
2018 CYBER SECURITY PREDICTIONS FOR AN UNPREDICTABLE WORLD
It’s right before the holidays, so might be a great time to shift gears and join an interesting and lively discussion about what 2018 may hold in store when it comes to cyber security predictions. Will Twitter and Facebook continue to be compromised by trolls aiming to fan the flames of discor...

Ten security controls for effective cybersecurity
TEN SECURITY CONTROLS FOR EFFECTIVE CYBERSECURITY
Security experts have predicted that this year's cyberthreats will be far worse than last's, with ransomware, DDoS, phishing, and cryptojacking attacks becoming even more sophisticated. Faced with an increase in cyberattacks and strict compliance regulations—like the EU's General D...

Securing Healthcare through Identity and the Cloud
SECURING HEALTHCARE THROUGH IDENTITY AND THE CLOUD
In this webinar, Sandy Dalal, Director of Identity and Access Management Services at Allergan, and Krystal Wang, product evangelist at Okta, will explore the role of identity in healthcare security frameworks. Sandy will also share Allergan's journey in its adoption of modern identity solutions ...

Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
IDENTITY IS SECURITY: AVOIDING THE PITFALLS OF AN AUTHENTICATION-CENTRIC SECURITY ARCHITECTURE
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data ar...

Take the first steps towards GDPR compliance
TAKE THE FIRST STEPS TOWARDS GDPR COMPLIANCE
Over the past year, IT Governance’s data protection and information security experts have shared – and continue to share – their understanding of the new General Data Protection Regulation (GDPR) through green papers, training courses, blogs and webinars in order to encourage organ...

The State of Mobile Device Security in Government – June 27, 2018
THE STATE OF MOBILE DEVICE SECURITY IN GOVERNMENT – JUNE 27, 2018
Webinar to highlight emerging mobile cybersecurity threats facing state and local governments, and what these entities can do to better protect mobile data. Zimperium is hosting a webinar for customers, media and the general public. Karen Jackson, Former Secretary of Technology for the Commonwealth ...

Threat Modeling to Reduce Real Software Security Risk
THREAT MODELING TO REDUCE REAL SOFTWARE SECURITY RISK
Application security risk management is about identifying key threats, implementing countermeasures, and validating your defenses are robust. It is technique often used just prior to testing; however, it has value from requirements gathering all the way through to application construction and deploy...

Getting Practical about Cybersecurity: What Must the Energy Sector Do to Raise Readiness?
GETTING PRACTICAL ABOUT CYBERSECURITY: WHAT MUST THE ENERGY SECTOR DO TO RAISE READINESS?
With cyber-attacks in the global energy sector getting more frequent and sophisticated, what steps should your organization be taking to strengthen cyber hygiene and overcome its cyber confidence gap? Find out by watching this on-demand webinar from the International Society of Automation, recorded ...

IT and Security - Working Better Together with ServiceNow and Rapid7
IT AND SECURITY - WORKING BETTER TOGETHER WITH SERVICENOW AND RAPID7
The relationship between IT and security can be complicated, but your vulnerability remediation doesn't have to be. It is inevitable running into challenges when IT teams are working with security teams on vulnerability remediation. Join Ken Mizota as he discusses those challenges that we all fa...

Recent Mobile Threat Trends
RECENT MOBILE THREAT TRENDS
Mobile threats continue to grow as threat actors look to target users of these devices for ransomware, espionage, or now, cryptocurrency mining. Join my monthly threat webinar and live Q&A session to learn about: Recent trends in mobile security threats. How these threats work. Steps to minimize...

Cloud Powered Application Security Testing
CLOUD POWERED APPLICATION SECURITY TESTING
Web application attacks continue to be the number one source of data breaches according to the 2017 Verizon DBIR. Rapid7 InsightAppSec is the latest solution to be delivered on the Insight platform, designed to identify and measure your application risk and assist in remediation so that your applica...

Secure your mobile devices against Threat
SECURE YOUR MOBILE DEVICES AGAINST THREAT
Smartphones and tablets have become an indispensable part of our lives. And as a result, hackers and cybercriminals are increasingly targeting mobile users to obtain both corporate and personal information. Join IBM Mobile Security expert Biju Tilak in an exclusive in-depth webinar that sheds light ...

Soaring Global Cyber-Gotchas: Dissecting the Ever-Expanding Threat Landscape
SOARING GLOBAL CYBER-GOTCHAS: DISSECTING THE EVER-EXPANDING THREAT LANDSCAPE
This quarter's threat landscape report revealed a distinct shift of cyber criminals turning their focus from ransomware to crypto jacking. We'll cover why crypto mining malware detections have more than doubled and where this trend has permeated. Plus, how these attacks are becoming more fin...

HOW TO REFRAME YOUR CYBERSECURITY STRATEGY
HOW TO REFRAME YOUR CYBERSECURITY STRATEGY
If your mission-critical systems are digital and are connected in some form or fashion to the internet (even if you think they aren’t, it’s highly likely they are), can they ever be made fully safe from cyberattacks? Cybersecurity expert Andy Bochman says the answer is no – and tha...

PROTECT YOUR ORGANIZATION AGAINST RANSOMWARE
PROTECT YOUR ORGANIZATION AGAINST RANSOMWARE
Let’s face facts, if your organization is not properly backing up data and planning for worst-case scenarios, you're company is probably at risk for a ransomware attack – and that’s a very risky proposition.  With the recent global ransomware attack, known now as “Wa...

OWASP Top 10 Threats & Mitigations
OWASP TOP 10 THREATS & MITIGATIONS
The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack. This webcast series presents the OWASP Top 10 in an abridged format, ...

The Five "Hows": How Cybersecurity Helps Drive Business Agility
THE FIVE "HOWS": HOW CYBERSECURITY HELPS DRIVE BUSINESS AGILITY
Information and cyber security is the prime concern for all the businesses today. The significant of businesses from conventional approach of operations to futuristic digital operations has raised various security issues for companies that need to be addressed before they could do irreparable harm. ...

Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
PANEL WEBINAR: REDUCING THE CYBER EXPOSURE GAP FROM CLOUD TO CONTAINERS
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of ...

Reducing Application Risk:  What Technology Can & Can’t Protect Against
REDUCING APPLICATION RISK: WHAT TECHNOLOGY CAN & CAN’T PROTECT AGAINST
Applications are the primary target of attack. Due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk.  This webcast will educate IT and development teams on technologies available to build and deploy more secure software systems and debunks ...

Dealing with Cyber Security Threats
DEALING WITH CYBER SECURITY THREATS
In this webinar, attendees will learn how to understand and mitigate cyber security threats in their CCTV, access control, and intercom installations, and discuss legal, insurance, and liability problems for the systems integrator. Webinar attendees will gain a better understanding of: – Under...

What Machine Learning Can (and Can
WHAT MACHINE LEARNING CAN (AND CAN'T) DO TO HELP SOLVE TODAY'S MOBILE SECURITY PROBLEMS
The security industry frequently throws around the buzz words “Machine learning” and “artificial intelligence”, but how can you separate fact from fiction regarding claims about these technologies? And what role and value do these technologies actually have in solving today&r...

Ransomware in the Age of Wannacry: What Fintech Needs to Know
RANSOMWARE IN THE AGE OF WANNACRY: WHAT FINTECH NEEDS TO KNOW
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on. This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the e...

Webroot Smarter Cybersecurity For The Connected World
WEBROOT SMARTER CYBERSECURITY FOR THE CONNECTED WORLD
Webroot Smarter Cybersecurity for The Connected World. Watch this video to learn how Webroot provides smarter cybersecurity solutions to businesses all over the world. Try Webroot for yourself at webroot.com/businesstrials.

Webinar: Measuring Your Cyber Security Risk
WEBINAR: MEASURING YOUR CYBER SECURITY RISK
Safeguarding against the inevitable requires a clear understanding of your cyber risk factors. But how do you determine that number?  In this on demand webinar, Jeff Schilling, Chief Security Officer at Armor, explores a simple equation that helps protect organizations by identifying their cybe...

Transform Time into a Cybersecurity Advantage
TRANSFORM TIME INTO A CYBERSECURITY ADVANTAGE
What determines success in security? Increasingly, the answer is “time.” Today, attackers have a time advantage. They design attacks that deliberately hide from defenses, and spread across your infrastructure in stealth while evading detection. Defenders must identify strategies that all...

2017 - State of Malware
2017 - STATE OF MALWARE
In 2016, we finally saw the headlines catch up with the hype. Cyberattacks and cybersecurity, or a lack thereof, grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who h...

Elasticsearch Cybersecurity Webinar Series: Addressing Security Gaps
ELASTICSEARCH CYBERSECURITY WEBINAR SERIES: ADDRESSING SECURITY GAPS
Search is a powerful solution that helps you identify your weaknesses and proactively minimize risk to your organization. Cybersecurity expert, Kevin Keeney, dives into how to address security gaps. Highlights Include: How open source augments traditional security models. New ways of thinking about ...

Artificial Intelligence in the Cyber Domain
ARTIFICIAL INTELLIGENCE IN THE CYBER DOMAIN
Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense. On April 19, join Michelle Cantos, Strate...

M-Trends 2018 - Understanding Today
M-TRENDS 2018 - UNDERSTANDING TODAY'S CYBER ATTACK TRENDS
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape. During this webinar, Managing Director Chris Nut...

Cyber Essentials webinar
CYBER ESSENTIALS WEBINAR
Cyber Essentials is a cyber security certification scheme that addresses five key security controls and sets out a good baseline of cyber security suitable for all organisations in all sectors. With Cyber Essentials, organisations can focus on core business objectives, drive business efficiency and ...

PandaLabs Reveals the Cybersecurity Trends in Store for 2018 - Panda Security Webinar
PANDALABS REVEALS THE CYBERSECURITY TRENDS IN STORE FOR 2018 - PANDA SECURITY WEBINAR
Today, more malware samples are created in just a few hours than in the entire twentieth century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more precisely designed. Attackers are meticulously studying their victims ...

Why VMware NSX, AirWatch & vSphere will redefine your Approach to Cyber Security
WHY VMWARE NSX, AIRWATCH & VSPHERE WILL REDEFINE YOUR APPROACH TO CYBER SECURITY
Data breaches, cyber-attacks, security lapses and new regulations have made IT security more challenging than ever now that every organization has gone digital. IT teams are struggling with points solutions, as the traditional security approach no longer works. Explore how VMware makes cyber securit...

Integrated Cyber Threat Intelligence, Threat Hunting and Response With IBM i2, QRadar and Resilient
INTEGRATED CYBER THREAT INTELLIGENCE, THREAT HUNTING AND RESPONSE WITH IBM I2, QRADAR AND RESILIENT
With the rise of advanced threats, the SOC is faced with the growing challenge of adversaries skilled at evading detection. In addition, analysts are overwhelmed by the volume and complexity of data, and they often struggle to find the signal in the noise. Discover how IBM i2, QRadar and Resilient p...

Cybersecurity Fundamentals for Everyone
CYBERSECURITY FUNDAMENTALS FOR EVERYONE
Cyber is full of complicated words and alien concepts. In this webinar we will define the concepts and phrases you need to know, and explain how to get started on cyber security. Subscribe to the ITMPI to access over 1000+ hours of on demand, PDU approved webinars: http://www.itmpi.org/subscribe Fre...

Password Management: Getting Down to Business
PASSWORD MANAGEMENT: GETTING DOWN TO BUSINESS
Passwords have become a necessity in today’s world and are relied upon by a variety of different services to ensure safe and secure access. However, users complain about the burden of coming up with complex passwords, and the even bigger challenge of remembering multiple passwords. What’...

2018 Threat Predictions New Devices, New Threats
2018 THREAT PREDICTIONS NEW DEVICES, NEW THREATS
Please join McAfee leading researchers from McAfee Labs and Office of the CTO as they share threat landscape predictions for 2018. We find ourselves in a highly volatile stage of cybersecurity, with new devices, new risks, and new threats appearing every day. In this webcast, Raj Samani, Lynda Grind...

WannaCry Ransomware Attack: Splunk Briefing and Demo
WANNACRY RANSOMWARE ATTACK: SPLUNK BRIEFING AND DEMO
From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects...

CISO Panel: 5 Ways to Combat Modern Security Challenges
CISO PANEL: 5 WAYS TO COMBAT MODERN SECURITY CHALLENGES
Last year saw dramatic shifts in the cybersecurity landscape. The number of data breaches and cyber-attacks is skyrocketing. CISOs and security leaders are struggling to find and invest in the best approaches to combat cybercrime for their organizations. Traditional application security testing meth...

State of Cyber-Security Arms Race: Preparing for what
STATE OF CYBER-SECURITY ARMS RACE: PREPARING FOR WHAT'S COMING IN 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security indust...

The Working Cloud: Tackling the Security Risks
THE WORKING CLOUD: TACKLING THE SECURITY RISKS
Cloud computing offers a credible alternative to traditional IT delivery models.  But there's no doubt about it - entrusting infrastructure and data to a third party will reduce control and introduces new risks that need to be managed.  Rather than being the Department of "NO"...

Cyber Threat Intelligence: Learn How It Can Drive World-Class Security
CYBER THREAT INTELLIGENCE: LEARN HOW IT CAN DRIVE WORLD-CLASS SECURITY
The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business. When it is better utilized, CTI significantly enhances an organization’s ability to anticipate, identify, respond to, and re...

Webcam Panel Threats and Cyber Resilience
WEBCAM PANEL THREATS AND CYBER RESILIENCE
Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks? Join this interactive panel to learn more about: The latest cyber threats. New attack trends. Fighting cyber crim...

GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR CHALLENGES FOR THE HEALTHCARE SECTOR AND THE PRACTICAL STEPS TO COMPLIANCE
With growing cyber threats facing the NHS and other healthcare organisations, and the UK government promising patients secure healthcare services, addressing cyber security must be a priority for all organisations handling patient records and sensitive data. To keep pace with the digital landscape a...

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management
2018 IT PRIORITIES: CYBERSECURITY, CLOUD OUTSOURCING & RISK MANAGEMENT
The technology landscape for firms is changing rapidly with new cyber threats cropping up constantly and cloud outsourcing gaining more and more momentum. Join ACG and a panel of experts to gain the insights you’ll need for 2018. Highlights include: CYBER: Which cyber threats really matter, an...

Cyber security in life sciences – Webinar
CYBER SECURITY IN LIFE SCIENCES – WEBINAR
Watch a recording of our webinar held on 7 March 2018, which provides insights into how cyber security can impact life sciences organisations. In this webinar, KPMG Partners Caroline Rivett, Life Sciences Global Cyber Security Leader, and Stan Gallo, Australian leader for Forensic Technology and Cyb...

Addressing The Security Challenges of the Cloud Generation
ADDRESSING THE SECURITY CHALLENGES OF THE CLOUD GENERATION
Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk. Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of Saa...

Info - eents
INFO - EENTS
qwerftgqwe3waqrgrgrgr

Cyber Security: Protecting Assets
CYBER SECURITY: PROTECTING ASSETS
With viewers consuming content on an increasing array of devices and platforms and the virtualisation of workflows, the task of protecting assets has never been so complicated and costly. Add to this the fact that the media industry is a high-profile target for hackers and it becomes clear that cybe...

App Ecosystem Explosion: MaaS360 Features New Partners and Endpoint Security Add-Ons
APP ECOSYSTEM EXPLOSION: MAAS360 FEATURES NEW PARTNERS AND ENDPOINT SECURITY ADD-ONS
IBM Security has expanded its partner ecosystem for unified endpoint management (UEM), now delivering a collection of IBM-certified 3rd party apps that integrate with IBM MaaS360 with Watson. This app ecosystem explosion gives IT & security leaders an intuitive framework to discover, download, a...

Cybersecurity for Small and Medium-Sized Enterprises Using the CIS Controls
CYBERSECURITY FOR SMALL AND MEDIUM-SIZED ENTERPRISES USING THE CIS CONTROLS
This webinar seeks to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with a small number of high priority actions based on the CIS Controls. Taking the approach that not every small business owner is an IT wizard or cybersecurity ninja, this guide focuses on ...

National Cybersecurity Awareness Month 2017
NATIONAL CYBERSECURITY AWARENESS MONTH 2017
National Cybersecurity Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Join Michael Kaiser, Executive Director of the Nati...

Smart Cities, Cybersecurity, and The Intersection of IoT
SMART CITIES, CYBERSECURITY, AND THE INTERSECTION OF IOT
IoT and smart cities technologies are impacting – and improving – the business of government at all levels. Powering performance by accelerating processes, agencies are growing increasingly reliant on IoT devices and the data they produce. However, the security implications of these emer...

Why the future for women in security is now
WHY THE FUTURE FOR WOMEN IN SECURITY IS NOW
Cybersecurity remains an area where there is a significant shortage of skilled professionals. In particular, women remain sorely underrepresented. As a part of National Women’s History Month and International Women’s Day Celebrations, IBM leaders will discuss trends and challenges in cyb...

The 2018 Security Threat Landscape
THE 2018 SECURITY THREAT LANDSCAPE
How the progression of cultural IT trends and information security impacts your technological security and security team. How your security approach and technologies enables or hinders cyber security threats. How to arm your security teams and technologies to proactively combat cyber attacks Watchin...

How to Prepare for the 2018 Cyber Threats
HOW TO PREPARE FOR THE 2018 CYBER THREATS
Join Patrick Wheeler, Proofpoint’s Director of Threat Intelligence, on Wednesday, January 24th at 10 AM PT for our webinar, “How to Prepare for the 2018 Cyber Threats.” This live event will cover: Predictions for the 2018 threat landscape. Key actions you can take to prepare your o...

How to Approach a Cyber Security Review with Your Eyes Wide Open
HOW TO APPROACH A CYBER SECURITY REVIEW WITH YOUR EYES WIDE OPEN
Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018....

Building a Strong Information Security Program in 2018
BUILDING A STRONG INFORMATION SECURITY PROGRAM IN 2018
How can you build a strong information security program that ensures the protection of the confidentiality, integrity, and availability of your information assets and supporting infrastructure? How are your governance functions evolving to meet the latest cybersecurity threats? Join this webinar to ...

The Keys to Service Provider Network Security
THE KEYS TO SERVICE PROVIDER NETWORK SECURITY
How to win a battle against an army of cybercriminals, armed with inexpensive off-the shelf tools designed to create major disruption in your network and your customer’s operations? The answer: Through a comprehensive approach that harnesses that same power – security automation, scalabi...

Architecting Security for the Future: NetOps and SecOps
ARCHITECTING SECURITY FOR THE FUTURE: NETOPS AND SECOPS
Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of ...

Boost Cyber Security with Human Augmented Machine Learning
BOOST CYBER SECURITY WITH HUMAN AUGMENTED MACHINE LEARNING
Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization? In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional i...

Cyber Threat Predictions & Security for 2018
CYBER THREAT PREDICTIONS & SECURITY FOR 2018
With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018. This interactive Q&A panel with security ind...

Secure Development Lessons from Purposely Insecure Applications
SECURE DEVELOPMENT LESSONS FROM PURPOSELY INSECURE APPLICATIONS
Security pros and developers often use insecure apps to teach or demonstrate application vulnerabilities. The main activity is 'hacking' or showing how exploiting a given vulnerability works. WebGoat was (as far as we know) the first purposely insecure app for teaching web application securi...

AI in Cyber Security: Explained
AI IN CYBER SECURITY: EXPLAINED
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI t...

What are the full spectrum of mobile risks in 2018?
WHAT ARE THE FULL SPECTRUM OF MOBILE RISKS IN 2018?
What are the full spectrum of mobile risks in 2018? Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies. With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into...

Cyber Thursday: The Latest Challenges And Solutions To Cyber Threat
CYBER THURSDAY: THE LATEST CHALLENGES AND SOLUTIONS TO CYBER THREAT
Cyber Thursday is a regular monthly broadcast video which provides an update on the latest development in the field of Cyber Security. Every second Thursday of the month the programme will feature a number of contributors and panellists from both within Palo Alto Networks and third party thought lea...

Making Security Strategy Reality: Winning Strategy through Tactics
MAKING SECURITY STRATEGY REALITY: WINNING STRATEGY THROUGH TACTICS
In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals ...

Building a cyber security architecture to combat today’s threats
BUILDING A CYBER SECURITY ARCHITECTURE TO COMBAT TODAY’S THREATS
The cyberattack surface is growing as organisations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defence approach to security is no longer enough to protect your network. In this webinar, Erik Bartholomy, security architect at LogRh...

5 Mobile App Security MUST-DOs in 2018
5 MOBILE APP SECURITY MUST-DOS IN 2018
To close out the 2017 webinar season, our mobile security expert panel will review the top mobile threats of 2017 (e.g., Cloudbleed, Bootstomp, Broadpwn, and more) and then debate what’s next in mobile app security and mobile app security testing for 2018. Join us for a spirited discussion of ...

Protect your organization from cyber attacks
PROTECT YOUR ORGANIZATION FROM CYBER ATTACKS
Security is everyone’s responsibility. With the threat of cyber attacks on the rise, growing concerns over data breaches and the high cost—both to your company’s reputation and bottom line—of a serious hack, you simply cannot assume everyone uses common sense all the time. Wa...

What GDPR Means for Your Security
WHAT GDPR MEANS FOR YOUR SECURITY
For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the se...

2018 Cyber Security Trends
2018 CYBER SECURITY TRENDS
Following our latest blog post, 7 key cyber trends to know about for 2018, we will host a webinar on Thursday, the 11th of January at 11am where we will delve into these trends in more detail. Sean Rooney, Cyber Risk and Assurance Director will host the 40 minute webinar and will discuss. The threat...

Top Cybersecurity Trends for 2018
TOP CYBERSECURITY TRENDS FOR 2018
Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and its supporting process are increasing in number and sophistication. Traditional IT security leaders have now become digital security leaders as they expand support...

Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
NEXT-GEN DIRECTORY SERVICES: HOW CIAM AND IOT DRIVE SECURITY & PERFORMANCE
The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies as...

Cybersecurity for Michigan Manufacturers Webinar
CYBERSECURITY FOR MICHIGAN MANUFACTURERS WEBINAR
Experts from the Michigan Manufacturing Technology Center-West and Brightline Technologies talk about the unique challenges and threats that manufacturers face from cyber attacks. Download this PDF for a 4-Step Cyber Security Program.

Application Security Fundamentals
APPLICATION SECURITY FUNDAMENTALS
Veracode CTO and Co-Founder Chris  Wysopal addresses the fundamentals of application security. The webinar covers some real world examples of vulnerabilities being exploited, how we can reduce the number and severity of vulnerabilities in our applications, and automated software testing techniq...

Eliminate the IOT Security Blind Spot
ELIMINATE THE IOT SECURITY BLIND SPOT
Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses: Where current architecture is falling short, What next-generation architecture should look like, How to address vulnerabilities found in IoT devices/...

Targeted Attacks Illustrated
TARGETED ATTACKS ILLUSTRATED
There’s a multitude of ways in which attackers can get into company networks, and when they’re in, surprisingly many manage to go unnoticed for long periods of time. Why? In the beginning of a targeted attack the advantage is in the attacker’s corner, as defenders have limited ways...

10 Things to Test Before Buying Your Next-Generation Firewall
10 THINGS TO TEST BEFORE BUYING YOUR NEXT-GENERATION FIREWALL
How do you ensure that you buy the right next-generation firewall today to meet your organization’s networking, performance and security needs for the present and the future? The best approach is to test it before you buy it. Your next-generation firewall should enable more than just applicati...

Three Secrets to Becoming a Mobile Security Super Hero
THREE SECRETS TO BECOMING A MOBILE SECURITY SUPER HERO
How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

Data-driven Cybersecurity Defense for Organizations and their Ecosystems
DATA-DRIVEN CYBERSECURITY DEFENSE FOR ORGANIZATIONS AND THEIR ECOSYSTEMS
Many companies rely on staticpoint-in-time security assessments to measure the cybersecurity health of their enterprise and vendor ecosystem. This approach is quickly becoming obsolete in today’s dynamic cyber threat landscape, fraught with increasingly sophisticated adversaries deploying mali...

Counter the Careless Click, Tools to Help You Train Your Users
COUNTER THE CARELESS CLICK, TOOLS TO HELP YOU TRAIN YOUR USERS
Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. Join this 30-minute webinar “Counter the careless click, tools to help you train your users...

Top 5 Cybersecurity Trends for 2018
TOP 5 CYBERSECURITY TRENDS FOR 2018
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends f...

Security and the Changing Value of our Data
SECURITY AND THE CHANGING VALUE OF OUR DATA
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed. Because of this chan...

Top 5 Application Security Risks Threatening Your Business Today
TOP 5 APPLICATION SECURITY RISKS THREATENING YOUR BUSINESS TODAY
A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense. In this webinar, we will share results from our recent primary ...

Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
DATA DRIVEN SECURITY: IMPROVE YOUR SECURITY POSTURE TO DEFEAT YOUR ADVERSARY
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring ...

Top Cybersecurity Priorities for CISOs
TOP CYBERSECURITY PRIORITIES FOR CISOS
Aligning security with business goals remains a challenge for CISOs across industries. In an age of relentless attacks, CISOs need to be proactive, informed and have the resources to launch a resilient cyber defense. Tune in to this interactive panel discussion to learn the key cyber priorities for ...

Addressing the Biggest Problem in Healthcare IT: Protecting Endpoints
ADDRESSING THE BIGGEST PROBLEM IN HEALTHCARE IT: PROTECTING ENDPOINTS
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Endpoint Security: The Final Frontier
ENDPOINT SECURITY: THE FINAL FRONTIER
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient...

Ransomware: The Billion-dollar Innovation Industry
RANSOMWARE: THE BILLION-DOLLAR INNOVATION INDUSTRY
Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.

Bad Rabbit Ransomware: What you need to know to stay safe
BAD RABBIT RANSOMWARE: WHAT YOU NEED TO KNOW TO STAY SAFE
A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been mo...

Emerging DDoS Trends 2017: Empty Threats & Real Attacks
EMERGING DDOS TRENDS 2017: EMPTY THREATS & REAL ATTACKS
This year the cyber-security realm has experienced a few dramatic emerging trends to include a couple of the largest denial-of-service attacks and ransomware outbreaks in history. Follow NSFOCUS as we take a deeper look into these DDoS attacks and some of the processes that now seem to be tied to th...

How to Social Engineer Your Users Into More Secure Behavior
HOW TO SOCIAL ENGINEER YOUR USERS INTO MORE SECURE BEHAVIOR
In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain....

The Software-Defined Datacenter & Security: A Webinar by Bitdefender & VMware
THE SOFTWARE-DEFINED DATACENTER & SECURITY: A WEBINAR BY BITDEFENDER & VMWARE
Software-defined datacenter technologies are a foundational pillar of datacenter transformation to enable digital business and agile IT. In addition to enabling datacenter agility, automation and cost containment, the software-defined datacenter presents new challenges and offers new opportunities a...

Symantec
SYMANTEC'S 2018 CYBERSECURITY PREDICTIONS
In 2018, the Internet of Things (IoT) will take centre stage as botnets, ransomware, and hackers target them with creative techniques such as playing analog sounds to exploit vulnerabilities in these devices. Attackers are also gaining expertise in psychology in decision theory, and may use this kno...

Threat Intelligence 2017: Biggest Breaches and Events
THREAT INTELLIGENCE 2017: BIGGEST BREACHES AND EVENTS
2017 has been another year full of front-page computer security events and incidents. Headlines have bulged with state-sponsored attacks, ransomware, leaks, and a continuing wave of data breaches. In this webcast, Ryan Sommers, threat research manager, and Erika Noerenberg, senior malware analyst, r...

Top 5 Strategies to Prevent Ransomware
TOP 5 STRATEGIES TO PREVENT RANSOMWARE
It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight. In this webinar “Top 5 Strategies to Prevent Ransomware” ...

Understanding your Attack Surface - Research into FT30 organisations
UNDERSTANDING YOUR ATTACK SURFACE - RESEARCH INTO FT30 ORGANISATIONS
Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the ove...

Phishing and Fraud: Latest Trends and Best Practices for Protection
PHISHING AND FRAUD: LATEST TRENDS AND BEST PRACTICES FOR PROTECTION
Join us for this, interactive webinar, where you will learn:What the latest threat trends are that we are seeing in 2017 and going into 2018, Which organizations are most at risk,How you can implement immediate strategies to proactively protect your institution and your customers.

Threat Intelligence-as-a-Service: Fortify Your Security Posture
THREAT INTELLIGENCE-AS-A-SERVICE: FORTIFY YOUR SECURITY POSTURE
Security organizations face numerous challenges, from increasingly large volumes of data and lack of tools and trained staff, to validate intelligence to the inability to operationalize threat intelligence. What’s required is a solution that addresses their business needs at every stage of the...

Keep the Bad Rabbit Ransomware Out of Your IT Garden
KEEP THE BAD RABBIT RANSOMWARE OUT OF YOUR IT GARDEN
On Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. No matter the size of your organization, you could become the target of a Ransomware attack. View this on-demand webinar to learn how you can protect your business from ransomwar...

Malware in SaaS Applications: The Unprotected Exploit
MALWARE IN SAAS APPLICATIONS: THE UNPROTECTED EXPLOIT
SaaS application use is rapidly increasing, with 70% of organizations having at least one application in the cloud(1). At the same time, however, 41% report concerns about the security of cloud solutions(2). In fact, while companies often employ technologies for advanced threats within their organiz...

IT Trends in 2018: Cybersecurity
IT TRENDS IN 2018: CYBERSECURITY
2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and ...

Four Things Every CEO Should Know About Ransomware
FOUR THINGS EVERY CEO SHOULD KNOW ABOUT RANSOMWARE
Ransomware has become a very real threat for most organisations, with attacks like "WannaCry" and "Bad Rabbit" filling news headlines over the last year. In this webinar we look at the key facts every CEO should know about ransomware in order to prepare for a potential attack.

Protecting your Organisation Against the Evolving Threatscape
PROTECTING YOUR ORGANISATION AGAINST THE EVOLVING THREATSCAPE
Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors.

Blazing the Trail: Changes Facing the Cybersecurity Industry
BLAZING THE TRAIL: CHANGES FACING THE CYBERSECURITY INDUSTRY
Join women leading in cybersecurity, Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco, for a lively roundtable discussion on security and data privacy.

Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks
SHRINKING YOUR ATTACK SURFACE: PREVENTING AND CONTAINING MULTI-STAGE WEB ATTACKS
Is your organization better protected than Equifax or Yahoo, as both were compromised using common web application attack vectors? Web application attacks are by far the largest source of breaches. And with historically low spending on web application security, more breaches are expected to come.

The evolution of ransomware and how to protect your organisation
THE EVOLUTION OF RANSOMWARE AND HOW TO PROTECT YOUR ORGANISATION
Ransomware has been a huge talking point over the last year or so with the large scale Wannacry and Petya outbreaks that caused significant damage worldwide. The strains that are now being seen show that cybercriminals are becoming more sophisticated in order to try and bypass security controls in o...

How automated security can deal with insider threats
HOW AUTOMATED SECURITY CAN DEAL WITH INSIDER THREATS
While 74% of organisations feel they are vulnerable to insider attacks, only 42% feel they can deal with them. In fact, it is insiders, hidden in plain sight, who are the real issue for security rather than external threats. But the cloud brings great opportunities to minimize this risk.

The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
THE NEXT LEVEL OF SMARTER ENDPOINT PROTECTION: GOING BEYOND ANTI-VIRUS PRODUCTS
Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses. Attend this webinar as the first step toward a smarter, more adaptive approach ...

Top 2017 Cyberattacks & How to Avoid Them in 2018
TOP 2017 CYBERATTACKS & HOW TO AVOID THEM IN 2018
2017 has been another year of endless headlines featuring words like "breached," "hacked," and "cyberattack" – many of which were avoidable. Enforcing security policy across the legacy physical network is already challenging, and the addition of virtualized networ...

What attackers know about your mobile apps that you don’t: Banking & FinTech
WHAT ATTACKERS KNOW ABOUT YOUR MOBILE APPS THAT YOU DON’T: BANKING & FINTECH
Our threat research team spends every waking moment reverse-engineering and cracking mobile apps and devices to help organizations reduce mobile risk. During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog will explain the attacker’s point-of-view, what attacker...

Application Security at the Speed of DevOps
APPLICATION SECURITY AT THE SPEED OF DEVOPS
Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer.

Take Action: Improving Cybersecurity in the Health Care Industry
TAKE ACTION: IMPROVING CYBERSECURITY IN THE HEALTH CARE INDUSTRY
In this webinar, security and privacy expert Chris Apgar will review highlights from a recently published Health Care Industry Cybersecurity (HCIC) Task Force report, including findings and recommendations for the industry and some practical implications for implementing these recommendations.

Teaming Together to Prevent Attacks and Protect Your Data
TEAMING TOGETHER TO PREVENT ATTACKS AND PROTECT YOUR DATA
Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks.

Ransomware: How to strategically Fight it, Without Breaking the Bank
RANSOMWARE: HOW TO STRATEGICALLY FIGHT IT, WITHOUT BREAKING THE BANK
Ransomware presents some unique challenges to organizations, regardless of the size, industry or geography. However, it has very distinct behavior relative to other kinds of malware. It actually tells you that an attack has taken place.

Facing up to Mobile Security Challenges
FACING UP TO MOBILE SECURITY CHALLENGES
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis.

Pulse Wave Attacks: The New DDoS Threat to Your Network
PULSE WAVE ATTACKS: THE NEW DDOS THREAT TO YOUR NETWORK
Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evang...

A Maturity Model for Healthcare Cybersecurity
A MATURITY MODEL FOR HEALTHCARE CYBERSECURITY
Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations ...

Combining threat intelligence and detection to prevent email based attacks
COMBINING THREAT INTELLIGENCE AND DETECTION TO PREVENT EMAIL BASED ATTACKS
Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move acr...

Cybersecurity in the Digital, Mobile & Cloud Era
CYBERSECURITY IN THE DIGITAL, MOBILE & CLOUD ERA
A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges: Identity that transcends every application access across multiple devices.

Cybersecurity Demystified: Building a Practical & Sensible Cybersecurity Program
CYBERSECURITY DEMYSTIFIED: BUILDING A PRACTICAL & SENSIBLE CYBERSECURITY PROGRAM
Technology alone does not equal business outcomes. You have invested in more tools resulting in more alerts and more security spend, but you are not seeing better security outcomes—preventing the data breach from the compromised insider, stopping the malicious insider, or blocking the accident...

Predict Ransomware Attacks Using AI
PREDICT RANSOMWARE ATTACKS USING AI
Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction. How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control commu...

Don
DON'T LET RANSOMWARE KEEP YOU UP AT NIGHT
The proliferation of complex and resilient ransomware variants has dominated recent media headlines. This year has heralded the emergence of self-replicating, worm-like, ransomware in the form WannaCry and Petya.

4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service
4 REASONS NEXT-GENERATION ANTIVIRUS SHOULD BE YOUR NEXT MANAGED SERVICE
There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization a...

Our Security, Delivered Your Way: Channel Profitability as an MSSP
OUR SECURITY, DELIVERED YOUR WAY: CHANNEL PROFITABILITY AS AN MSSP
In the first webinar of this informative series, join WatchGuard and The Channel Company as they take an in-depth look at market trends and opportunities for value added resellers (VARs) transitioning to managed security service providers (MSSPs).

Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security
EXTEND CONTENT & MALWARE ANALYSIS BEYOND PROXYSG TO EMAIL & DOUBLE YOUR SECURITY
Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and...

Providing Security and Threat Protection for the Enterprise - Why It Matters
PROVIDING SECURITY AND THREAT PROTECTION FOR THE ENTERPRISE - WHY IT MATTERS
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

Cognitive Security in Action: Watson at Wimbledon
COGNITIVE SECURITY IN ACTION: WATSON AT WIMBLEDON
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operati...

Comprehensive Cyber Security & Incident Response: CISCO + Splunk
COMPREHENSIVE CYBER SECURITY & INCIDENT RESPONSE: CISCO + SPLUNK
The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

How Hackers Exploit Your Windows Tools, Part 2: The WMI Threat
HOW HACKERS EXPLOIT YOUR WINDOWS TOOLS, PART 2: THE WMI THREAT
Windows Management Instrumentation (WMI) is a Microsoft Windows administrative tool that has access to all system resources, making it powerful for both legitimate and illegitimate use. Via WMI you can do things like execute, delete and copy files; change registry values; and identify which security...

Five Mobile Security Challenges Facing Enterprise
FIVE MOBILE SECURITY CHALLENGES FACING ENTERPRISE
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile.

How to Scale Mobile Application Security Testing
HOW TO SCALE MOBILE APPLICATION SECURITY TESTING
Mobile devices have permeated our personal lives, and increasingly impact all types of enterprise. The information security industry is just beginning to catch up to the dramatic impact of mobile. Since inception, NowSecure has focused entirely on mobile. Join Sam Bakken as he shares insights into 5...

2017 Trends in IoT Cyber Attacks
2017 TRENDS IN IOT CYBER ATTACKS
There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual pow...

The Second Coming of Ransomware - Insights into New Developments
THE SECOND COMING OF RANSOMWARE - INSIGHTS INTO NEW DEVELOPMENTS
We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money.

An Elegant and Practical Model for Security Practitioners
AN ELEGANT AND PRACTICAL MODEL FOR SECURITY PRACTITIONERS
Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.

How Threat Intelligence Helps You Combat Targeted Malware
HOW THREAT INTELLIGENCE HELPS YOU COMBAT TARGETED MALWARE
As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware. There are steps you can take to defend against ...

Better Protect Your Web Apps by Knowing How They Will Be Attacked
BETTER PROTECT YOUR WEB APPS BY KNOWING HOW THEY WILL BE ATTACKED
Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will: gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise, ...

Stop Living in the Past: A New Approach to Application Security
STOP LIVING IN THE PAST: A NEW APPROACH TO APPLICATION SECURITY
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point.

Introducing CDL - The Cybersecurity Data Lake
INTRODUCING CDL - THE CYBERSECURITY DATA LAKE
An introduction to CDL, the world's first managed on-premise and cloud cybersecurity data lake. Developed with Intel and leading data center, cloud and security vendors, CDL is designed to democratize security analytics at scale, unlock the potential of today’s siloed security solutions.

Be Ready or Pay the Price: Defending Against the Next Ransomware Attack
BE READY OR PAY THE PRICE: DEFENDING AGAINST THE NEXT RANSOMWARE ATTACK
Despite 2017 only being halfway over, there is a long list of significant breaches impacting organizational reputation and bottom line across a variety of industries. The WannaCry and NotPetya outbreaks exploited computer security vulnerabilities.

The Future of Cyber Security - Facts & Predictions
THE FUTURE OF CYBER SECURITY - FACTS & PREDICTIONS
Ransomware, one of today's biggest security threats, has become a massive growth opportunity for our channel. As key stakeholders fear now that their organisation will eventually be hit by a ransomware attack, they are willing to spend more on IT security solutions.

The State of Application Security: Hackers On Steroids
THE STATE OF APPLICATION SECURITY: HACKERS ON STEROIDS
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications. This webinar will detail key insights from the ...

Disrupting Credential-based Attacks
DISRUPTING CREDENTIAL-BASED ATTACKS
Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials. In this session, get detai...

Secure Your Business: How to Improve Threat Detection & Response
SECURE YOUR BUSINESS: HOW TO IMPROVE THREAT DETECTION & RESPONSE
Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. So how do you improve your company’s security? How should you prioritize? How can you integrate a...

Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
LEARN HOW THE NIST CYBERSECURITY FRAMEWORK BENEFITS STATE AND LOCAL GOVERNMENTS
The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture. Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and loc...

The Worst Privacy and Security Risks and How To Defend Against Them
THE WORST PRIVACY AND SECURITY RISKS AND HOW TO DEFEND AGAINST THEM
We live in the age of high-profile breaches and cyber attacks. Every organization is a target, especially in the financial, healthcare and government space. With so much at stake in the event of a breach, what are the biggest cybersecurity risks for organizations? How should we defend against them? ...

Trends in Phishing Response Strategies
TRENDS IN PHISHING RESPONSE STRATEGIES
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

The cyber security challenges faced by businesses adopting a BYOD strategy
THE CYBER SECURITY CHALLENGES FACED BY BUSINESSES ADOPTING A BYOD STRATEGY
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey p...

Crisis Management Techniques for Cyber Attacks
CRISIS MANAGEMENT TECHNIQUES FOR CYBER ATTACKS
The discussion focuses specifically on how to prevent and be best prepared for cyber-attacks in a situation of a crisis.Main points covered:What is a crisis and what are its common features? Business Continuity threats: How likely is that a cyber-attack will occur? Statistics: What industries are at...

Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
MALWARE DETECTION - HOW TO SPOT INFECTIONS EARLY WITH ALIENVAULT USM ANYWHERE
Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of...

Advanced Attacker Deception: Taking Action on the New Threat Terrain
ADVANCED ATTACKER DECEPTION: TAKING ACTION ON THE NEW THREAT TERRAIN
As businesses advance their use of emerging technologies, they also create new openings for cyber attackers. The key to protecting your organization from APTs and other sophisticated threats is to detect intrusions as early as possible in the attack cycle. But this is easier said than done. Using va...

Advanced DDoS Attack Protection
ADVANCED DDOS ATTACK PROTECTION
Government Agencies, Enterprises and Service Providers all experience continuous cybersecurity attacks that often begin with Distributed Denial of Service (DDoS) attacks. DDoS attacks are a world-wide phenomenon impacting all industries, are more complex than ever before, and are increasing in size ...

Are You Prepared for Ransomware?
ARE YOU PREPARED FOR RANSOMWARE?
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, both government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, ex...

Staying Ahead of Cyber Attacks | Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS | NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
Can the managed detection and response (MDR) framework protect organizations from today’s advanced, sophisticated threats?  In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber secu...

Endpoint Detection and Response is not enough
ENDPOINT DETECTION AND RESPONSE IS NOT ENOUGH
Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on ...

Stop Pulling Your Hair about Cyber Threats
STOP PULLING YOUR HAIR ABOUT CYBER THREATS
You can construct & deconstruct your app environments and integrate security testing tools while assessing vulnerabilities before releasing to production. Getting anxious about cyber attacks? You're not alone: there’s hardly a day passing by without news of a security breach. Keeping a...

Staying Ahead of Cyber Attacks Next Gen SOC :Getting Started with Managed Detection
STAYING AHEAD OF CYBER ATTACKS NEXT GEN SOC :GETTING STARTED WITH MANAGED DETECTION
In this webinar, we discuss the different components of MDR and how it can advance your existing security operations. Frost and Sullivan’s principal cyber security consultant Parminder Saini and Paladion’s top cyber security expert Jose Varghese decode the MDR framework to help you under...

NotPetya: Ransomware Or a Cyber Attack in Disguise
NOTPETYA: RANSOMWARE OR A CYBER ATTACK IN DISGUISE
The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the w...

Cybersecurity Tips for IT/OT Networks
CYBERSECURITY TIPS FOR IT/OT NETWORKS
With the growing use of converged IT/OT networks, a number of cybersecurity vulnerabilities and challenges have emerged that many operation managers are still learning to deal with. In this webinar, we share the most important known cybersecurity issues with IT/OT networks, and the latest tips and b...

THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
THE 5 KEYS FOR DEALING WITH AN EMAIL-BORNE RANSOMWARE ATTACK
Email-borne ransomware attacks are on the rise. An average of 4,000+ ransomware incidents have occurred daily since the start of 2016*. What should you do if your organization is hit by ransomware? The key is to have a plan before it happens because the bad guys won’t give you much time to rea...

Locky, WannaCry, now Petya/NotPetya. Is this the new normal in Cyber Security?
LOCKY, WANNACRY, NOW PETYA/NOTPETYA. IS THIS THE NEW NORMAL IN CYBER SECURITY?
What we see is that the cyber arms race continues to evolve. If I were to boil this down to its essence, cyber criminals are combining exploits and attacks in creative ways that are not necessarily brand new, but can be tweaked and combined in new ways to create very effective attacks. Like mixing c...

DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
DEFENDING AGAINST THE DATA BREACH: IMPLEMENTING A DEFENSE-IN-DEPTH SECURITY STRATEGY
Motivated hackers will find multiple attack vectors in order to access sensitive data—the crown jewels. A comprehensive preventive strategy is key to slowing down and mitigating damage that might be done by the intruder. While most of these impacted companies were utilizing the latest network ...

After WannaCry: Getting Ahead of Ransomware
AFTER WANNACRY: GETTING AHEAD OF RANSOMWARE
WannaCry is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally. It is imperative for organizations of all types to be prepared to quickly address the growing threats of ransomware. Join Tim Bandos, our Senior Director of...

The Impact of Ransomware & How to Defend Against It
THE IMPACT OF RANSOMWARE & HOW TO DEFEND AGAINST IT
Ransomware attacks have been an ongoing concern since they first emerged as a threat in the mid-2000s and this method of extortion has continued to wreak havoc on individuals and businesses alike across the globe.  Last year saw a prolific increase in the number of new ransomware families and 2...

WannaCry Ransomware Attack: What to Do Now
WANNACRY RANSOMWARE ATTACK: WHAT TO DO NOW
Find out what you need to know and how to protect your organization against the WannaCry ransomware attack, the largest coordinated cyber attack of its kind. WannaCry has already crippled critical infrastructure, multiple hospitals and telecommunications organizations, infecting hundreds of thousand...

Orchestrate Your Security Defenses with Threat Intelligence
ORCHESTRATE YOUR SECURITY DEFENSES WITH THREAT INTELLIGENCE
Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it’s difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to ide...

Insiders and Smart Attackers: How to Track & Stop the Rogue
INSIDERS AND SMART ATTACKERS: HOW TO TRACK & STOP THE ROGUE
Despite some of the most noted ‘leakers’ now having served their punishments, the insider threat still looms large over industry as the hardest to detect with the potential to cause the most damage, providing a dire consequence for a company to find itself in. Whether it is an insider go...

A Look at the WannaCry Aftermath and Ways to Prevent Recurrences with IBM MaaS360 with Watson
A LOOK AT THE WANNACRY AFTERMATH AND WAYS TO PREVENT RECURRENCES WITH IBM MAAS360 WITH WATSON
The WannaCry ransomware attack has come – but not yet gone – as organizations continue to struggle with its destructive fallout across 150 countries and over 200,000 endpoints. A hard lesson learned: this massive threat was wholly preventable. Moving forward, enterprises need the right h...

Battling Unknown Malware With Machine Learning
BATTLING UNKNOWN MALWARE WITH MACHINE LEARNING
CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addit...

Security at Speed: Integrating AppSec into the Tools you Already Use
SECURITY AT SPEED: INTEGRATING APPSEC INTO THE TOOLS YOU ALREADY USE
Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community. Join us for a webinar a...

Cyberattacks: Why Mid-Market Companies Believe They
CYBERATTACKS: WHY MID-MARKET COMPANIES BELIEVE THEY'RE SAFE - BUT AREN'T
A recent Arctic Wolf study found a prevalent cybersecurity dissonance between perception and reality, in which most companies believe that they are more cybersecure than they actually are. This is especially dangerous for mid-market companies, which face the same cyberthreats and issues but with few...

Ransomware from a Hacker’s Perspective
RANSOMWARE FROM A HACKER’S PERSPECTIVE

As last weeks global Wannacrypt cyber attack has shown, Ransomware has indeed matured and its impact on business has grown exponentially.  In the last week alone hackers encrypted hundreds of thousands of files across hundreds of countries globally, incapacitating users and taking whole...

Stop Attackers from Phishing Your Inbox for Good
STOP ATTACKERS FROM PHISHING YOUR INBOX FOR GOOD
Inbound email is the primary source of phishing attacks that lead to breaches like ransomware, BEC attacks, malware and credential harvesting. Area 1 Security locks down your email to keep your organization safe from hacks where current secure email gateways and anti-spam filters fail. This webinar ...

Dealing with Skills Gap in Cyber Security
DEALING WITH SKILLS GAP IN CYBER SECURITY
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Buildin...

WannaCry: Inside the Next Generation of Malware Attacks
WANNACRY: INSIDE THE NEXT GENERATION OF MALWARE ATTACKS
In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future NSA-inspired outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them. We will in...

Anatomy of the attacks: WannaCry ransomware & Google OAuth phishing
ANATOMY OF THE ATTACKS: WANNACRY RANSOMWARE & GOOGLE OAUTH PHISHING
On May 3rd, over a million Gmail users granted a fake, but convincing, application full access to their emails and contacts. Two weeks later, a major ransomware attack spread rapidly and affected a multitude of organizations across the world. Needless to say, it’s been a busy month in the info...

Lessons Learned From the Hack of the DNC and Other Incidents
LESSONS LEARNED FROM THE HACK OF THE DNC AND OTHER INCIDENTS
The cause and consequence of several pivotal hacking incidents. What attack tradecraft and techniques will trickle down to the consumer attack community. What you can do to prevent incidents from causing major disruptions in your organization. As we have often heard, "Those who cannot remember ...

Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
ENHANCING YOUR SECURITY INFRASTRUCTURE WITH INFOBLOX THREAT INTELLIGENCE
If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that ...

Prepare for the Imminent Shifts in Endpoint Attacks
PREPARE FOR THE IMMINENT SHIFTS IN ENDPOINT ATTACKS
Ransomware is the latest tool being utilized by cybercriminals to monetize everyday security flaws, and it's causing huge headaches for organizations everywhere. However, the techniques leveraged by ransomware can be tackled – and the probability of an infection dramatically reduced &ndash...

Latest Malware Trends & Attack Vectors
LATEST MALWARE TRENDS & ATTACK VECTORS
In this webinar, Richard Cassidy, Technical Director EMEA, and (ISC)² EMEA Managing Director, Adrian Davis will discuss the latest malware trends and attack vectors. The most reported cyber-criminal groups, the latest attack trends (like WannaCry), and best practices for fighting the adversary ...

DDoS: how to counter the new threats we
DDOS: HOW TO COUNTER THE NEW THREATS WE'RE SEEING IN 2017
The largest Distributed Denial of Service (DDoS) attack doubled in size over the last year. They’re now bigger, more complex, and require more expertise and tools to defend against than in the past. What action do you need to make it harder for an attacker to render your network unresponsive?&...

Improving Cybersecurity Posture While Staying on Budget
IMPROVING CYBERSECURITY POSTURE WHILE STAYING ON BUDGET
Nuspire's Shannon Culp and Dan Hoban discuss planning and prioritizing security projects, staying on top of the ever-changing threat landscape, and staying on track with your budget while doing so.

Don
DON'T CRY OVER WANNACRY RANSOMWARE
Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.Join us to learn what Symantec customers and non-customers can do against this threat and future threats ...

Trends Behind Today
TRENDS BEHIND TODAY'S BREACHES & CYBER ATTACKS IN EMEA
Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks. Register today and get insights into: New phishing trends breaching today’s companies. Changes in modern at...

A Guide to Predicting Cyber Attacks
A GUIDE TO PREDICTING CYBER ATTACKS
The increasing number of email-based cyber attacks on the banking and financial services sector, as well as the continuous evolution of these attacks, requires both Risk Management and Information Security professionals to be constantly vigilant - and prepared - to protect their organizations from t...

From Targeted to Distributed - Raise your Defenses Against Ransomware and Modern Malware
FROM TARGETED TO DISTRIBUTED - RAISE YOUR DEFENSES AGAINST RANSOMWARE AND MODERN MALWARE
Modern malware has evolved and mutated to be hard to detect, defend and protect against. Now to be sure that you are protected from the most common threat you need the best level of security, and is endpoint security like anti-malware really keeping up?While statistics show that worms such as Confic...

Bigger Isn
BIGGER ISN'T ALWAYS BETTER: ASSESSING CYBER RISK TO REDUCE YOUR ATTACK SURFACE
Ransomware, spear phishing and third party breaches have become a huge problem as organizations become more connected online and expand their cyber footprint. When even the largest and most sophisticated global organizations, government agencies, and multinational banks are routinely penetrated and ...