Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity. In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.
Watch Now



What's Your DNS Security Risk? Insights from Recent Ponemon Survey

Vanguard Group

Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into: The level of visibility these organizations have, especially in today’s complex network deployments. Their use of threat intelligence and the effectiveness of threat intelligence. The efficiency of their security operations.
Watch Now

The Role of Human Error in Information Security


It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on the root cause and prevention tips resulting from these events.
Watch Now

California Consumer Privacy Act: Are You Prepared for 2020?

InfoSec Institute

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to have wide-reaching impact.
Watch Now

4 CI Security Best Practices To Prevent Cloud-Native Supply Chain Attacks

CI/CD pipelines are the heartbeat of cloud-native supply chains. Developers and DevOps teams depend on them every day to test, integrate, and deliver software, but as they become more exposed to the outside world, they can introduce new complexities and weaknesses. And as the saying goes, chains are only as strong as their weakest link.
Watch Now