Information Security Exposures: Creating and Sustaining a Culture of Security

MGI Worldwide members from across the globe took part in our latest webinar on July 24th, hosted by Founding Partner, Producer and Vice-President Stephen Vono of McGowanPRO. Titled 'Information Security Exposures: Creating and Sustaining a Culture of Security’ the webinar was geared towards all levels of staff, with the aim of helping everyone gain a better understanding of information security threats, their exposures, and important steps that need to be taken to address this issue. The webinar focused on the importance of establishing a culture of client information security for all firms. Stephen also discussed the risks relating to information exposure, as well as the policies and procedures needed to prevent this for information security best practice.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Stopping Email-Borne Threats Before They Spread

Mimecast

Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the same diligence as your inbound email? What about the emails being sent out to your partners, suppliers, and customers? Attend this webinar to take a step inside your organization’s entire email traffic to learn about: The latest techniques that attackers are using to target your users. How attacks are spread both internally and externally. Advanced security and automation to defend your organization from compromised users and internal threats.
Watch Now

Introduction to Kubernetes Security

Aqua

Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. Brice Fernandes, software engineer and entrepreneur at Weaveworks, will then demonstrate how you can build a secure and reliable Kubernetes deployment pipeline with GitOps best practices, separating the responsibility between packaging software and releasing it to a production environment.
Watch Now

Cybersecurity in a Changed World: 2021 Trends and 2022 Predictions

If 2020 seemed like an anomaly, 2021 proved to us that it’s time to get comfortable with the transformed reality. Remote work, intended as a temporary response to COVID-19, is now an increasingly standardized way to operate. With face-to-face operations no longer the norm, numerous organizations have shifted to a technology-driven strategy. We’ve seen a rise in initiatives like self-service or online purchases, as well as an upturn in remote events, with many new or established conferences choosing to go virtual. Businesses are also investing in technology more than ever, growing their IT infrastructure with new software and IoT devices. However, as can be expected, new or enhanced cybersecurity threats went hand and hand with this unexpected digital renaissance.
Watch Now

How Malware Affects Your Security Rating & What to Do About It

BitSight

Learn how botnet infections can impact your security posture. Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organization, affecting its reputation, brand value and customer loyalty. Security ratings are impacted by these, giving an independent view into potential areas where security resources could be focused. In this webinar, BitSight's Tiago Pereira explains how and why botnet infections are a key metric of the effectiveness of your security posture, their impact on external security ratings and how to effectively deal with infections affecting your organization's rating.
Watch Now