As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As life on th
Watch Now
Use your next 30 minutes to update you on IoT and Cybersecurity.
During this on-demand webinar we are going to talk about
Cyber security threats and challenges towards global or regional regulatory alignment?
Standards and certifications
Nemko Cyber Security Assurance services
The schemes
Key factors for the manufacturer to cover
Common Criteria
Watch Now
ISACA
Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now
Just last year, cybercriminals attempted to poison the water supply in Florida by hacking into a city’s system. An airplane manufacturer’s confidential customer data files were breached and leaked on the Internet. A major gas pipeline was shut down by a ransomware attack. A major meat producer was forced to close down all its plants. Hackers are now targeting industrial and infrastructure. At the same time, more and more facilities are going to connected operations to empower new efficiencies. How do we keep our facilities protected amid these growing dangers and opportunities?
Watch Now