Attackers are targeting Active Directory in nearly every type of attack, especially ransomware attacks. Unfortunately, organizations struggle with where to begin to secure AD, as well as what should be emphasized. The end result is a weak AD security posture that is easily attacked and exploited by attackers. There is a solution to securing AD to disrupt attackers. By prioritizing the most exploited settings, the attack surface of AD can be dramatically reduced. This approach of securing AD gives every organization a clear starting and ending point to get through a first wave of securing their AD environment.
Watch Now
TechGig
Two seasoned cybersecurity professionals will discuss the breadth of cybersecurity in today's financial institutions, how this critical defence function operates, and what attributes a cybersecurity professional might need, to be successful in this field. They will also explore some of the recent major cybersecurity incidents from around the globe, and then talk about cybersecurity within HSBC itself.
Watch Now
Omnibus healthcare information security
Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now
Alert Logic
Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy? Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.
Watch Now