Live Broadcast: Be Empowered to Threat Hunt in 2019

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Key Functionalities of a Modern Cyber Threat Intelligence Program

Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting business objectives and allocating resources (for budget) of what the cybersecurity priorities should be? A modern CTI program needs to show value to the business because it will help solve some of the major problems we’re seeing in TI programs today (such as lack of resources or lack of data). Part of this includes bridging the gap between threat and risk to ensure your operational strategy aligns with the overall business objectives.
Watch Now

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Ponemon Survey Report: Measuring & Managing the Cyber Risks to Business Operations

Tenable

How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.
Watch Now

How Malware Affects Your Security Rating & What to Do About It

BitSight

Learn how botnet infections can impact your security posture. Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organization, affecting its reputation, brand value and customer loyalty. Security ratings are impacted by these, giving an independent view into potential areas where security resources could be focused. In this webinar, BitSight's Tiago Pereira explains how and why botnet infections are a key metric of the effectiveness of your security posture, their impact on external security ratings and how to effectively deal with infections affecting your organization's rating.
Watch Now