Learning to Win: Making the Case for Autonomous Cyber Security Solutions

Machine learning is revolutionizing many industries and forever changing how we interact with computer systems and each other. The revolution is particularly relevant to cyber security, where machine learning is used to help human analysts make sense of increasingly large amounts of data to identify threats and mitigate vulnerabilities. While this symbiotic relationship is improving our security posture, it is fundamentally limited by humans making decisions at human speed.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Modern Data Storage for Cyber Security Recovery

In the event of a security breach, are your backups secure and ready to get you back in business? At this exclusive session, we’ll showcase how Pure Storage can protect your backups in the event of a cyber security breach – and get you back to normal operations, faster than any other solution available today.
Watch Now

Cybersecurity Framework to Secure OT/ICS/SCADA Systems from Targeted Attacks

Join our experts in the digital event cybersecurity framework to secure OT/ICS/SCADA systems from targeted attacks With growing cyberattacks on ICS and SCADA systems, this is the time to revisit your OT cybersecurity measures and strategies to see if they are aligned with the new cyber realities that are already impacting businesses. The need of the hour is to invest in a robust yet an agile program that will reduce your risk exposure and deepen your institutional cyber resilience
Watch Now

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations

IBM

Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it. Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the horizon. California’s passing of the California Consumer Privacy Act of 2018 (CaCPA) on June 28 and adoption of a set of amendments to the law in September has proven to be a strong catalyst for a new focus on data security.
Watch Now

Threat Hunting—A Practical Demonstration

ISACA

Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now