2015 Cyberthreat Defense Report – Insights and Takeaways with Report Co-Author, Steve Piper

How does your security effectiveness compare?With the release of the 2015 Cyberthreat Defense Report from CyberEdge Group, Tenable will host a webinar with the report’s co-author, CyberEdge Group co-founder and CEO, Steve Piper to take a closer look at challenges, emerging trends and opportunities for enhancing security effectiveness highlighted in the report.Compare your security metrics with those of your peers.Bring your questions and join us a 2pm ET on March 25 for the live webinar.The 2015 Cyberthreat Defense Report will be available March 11, 2015. Everyone registering for the webinar will get the rThis year’s Cyberthreat Defense Report is based on an analysis of 814 survey responses from your peer North American and European IT security professionals. Covering a wide range of issues, the report provides deep insight into how infosec professionals perceive cyberthreats and what they’re doing to defend against them.eport.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

The Latest on Ransomware

Trend Micro

Ransomware has wreaked havoc on many organizations, causing financial losses, reputation damage, temporary or permanent loss of sensitive or proprietary information, and the list goes on. And as if that isn’t enough, the actors behind this threat have constantly changed their tactics and who they target—making security that much trickier.
Watch Now

HOW CAN YOU DEFEND YOURSELF IF YOU DON'T KNOW WHAT'S ON THE HORIZON?

SurfWatch Labs

SurfWatch serves as our threat intelligence team, providing us with critical link analyses and insights to proactively address any potential cyber threats to our customers and our business. Knowing what cyber threat and Dark Web activity is occurring helps us ensure the safeguarding of customer information and focus our cybersecurity efforts in the right areas.
Watch Now

2018 Threat Report and Top Malware

Webroot

If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Join this Channel Futures webinar to learn more about the discoveries and analysis of threat activity throughout 2017, the top malware of 2017 and how to be better equipped to overcome modern cybercrime in 2018.
Watch Now