A Maturity Model for Healthcare Cybersecurity

Palo Alto Networks

Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California.
Watch Now

Spotlight

NEVER TRUST, ALWAYS VERIFY. Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.


OTHER ON-DEMAND WEBINARS

Cybersecurity: Prime and Subcontractor Responsibilities

Cyber security On-Demand Webinar, cyber-attack On-Demand Webinar, malware On-Demand Webinar

It’s no longer a question of if your cybersecurity will be compromised, but when. Government contractors—both prime contractors and their subcontractors—must understand the federal cybersecurity landscape to ensure compliance with its numerous (and sometimes confusing) requirements.

The Inconvenient Truth about API Security

API

The notion of API management in which enterprise architects, app developers,and IT security experts work in harmony is great in theory. The reality, according to new research from Ovum, is much more scattered.Register today and join Ovum IT Security Analyst Rik Turner, Rami Essaid, CEO of Distil Networks and Shane Ward, Senior Director of Technology at GuideStar as they dig deep into API Security and what it means for your business.

Rapid Threat Detection & Response with Next Generation Firewall & SIEM

LogRhythm

Are you controlling the applications on your network? Are you able to quickly identify new cyber threats? Can you respond to and mitigate multi-vector advanced persistent threats (APTs)? A recent breach report stated that 66% of attacks took months or more to discover. Further, 76% of network intrusions exploited weak or stolen credentials with 71% targeted at user devices. A strong cyber threat defense strategy using Next Generation Firewall (NGFW) technology coupled with an advanced SIEM platform provides actionable insights to detect and respond to today's cyber threats and breaches faster and with greater accuracy than ever before.

Security Analytics: How to Identify True Risks to Your Data

Imperva

The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies. Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.