Cybersecurity: Bridging the Gap Between Physical Security and IT / IoT

On Monday, Dec. 11, as part of the SIA Webinar series, a webinar titled Cybersecurity: Bridging the Gap between Physical Security and IT/IoT covered best practices from edge to core hardening, bridging cyberprotection techniques, and technologies that help unify disparate technologies into a common cybersecurity framework. Speakers Vince Ricco (Axis Communications) and Ken Mills (Dell EMC) discussed how successful practitioners are hardening the physical security edge, enabling the authentication of devices systemwide and utilizing IT and IoT methodology to secure the enterprise.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

We're named a Leader. Again. Gartner Magic Quadrant for UEM Tools

Gartner has named us a Leader for unified endpoint management tools (UEM) again in 2019.* Whether desktops, laptops, smartphones, tablets, or IoT, our solution makes it easier for IT teams to take a modern, secure approach to managing all devices. All from a single platform. Download the 2019 Gartner report and see how we’re sha
Watch Now

Operationalizing Threat Intelligence to Battle Persistent Actors

ThreatConnect

Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation state threat and Monzy will do a live demonstration of operationalizing the new Threat Intelligence.
Watch Now

Five Phases of Ethical Hacking

GreyCampus

GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking & Career Opportunities. Phases of Ethical Hacking. Phase 1 – Reconnaissance.
Watch Now

TLS/SSL Inspection for Stronger Cybersecurity

With cyberattacks becoming easier and cheaper to launch, it’s no surprise that 80.5% of technology leaders consider cyber attacks at their organization likely. Pulse and A10 Networks surveyed 200 technology leaders to find out how their companies are thinking about SSL inspection and decryption solutions as part of a Zero Trust strategy.
Watch Now