2019 Vulnerability Management Predictions

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management,  discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cyber Value-at-Risk Webinar

Uleska

Cyber Value-at-risk (VAR) offers a revolutionary industry approach helping Enterprises with effective cyber management and vulnerability remediation prioritization. Simply classifying risks in broad terms such as “high”, “medium” or “low” does not tell you a business story. Understanding the business impact of various technical cyber issues, including responses costs, replacement costs, and potential regulatory fines, allows a business vision into true cyber business risk. Why attends this webinar? 1) Understand how cyber security compliance issues can be subject to regulatory fines.
Watch Now

5 steps every charity should take to improve their cyber security

NCSC

On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their organisation. In this session, we’ll look at the simple, free or low cost steps every charity should be taking to protect themselves online.
Watch Now

The Role of Threat Intelligence in Cyber Resilience

Omnibus healthcare information security

When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization? Most organizations don't even know when security controls have failed. This is a primary reason why intrusions exist in organizations for upwards of 200 days before being discovered. Additionally, heuristic and homogeneous alerts provide virtually zero context about anomalous activity inside the internal network and do nothing to help cyber defense teams prioritize and correctly remediate cyberattacks.
Watch Now

11 Ways to Defeat Two-Factor Authentication

KnowBe4

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now