Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Forescout

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity. In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.
Watch Now

Spotlight

While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and management challenges with big data. Hadoop’s core specifications are still being developed by the Apache community and, thus far, do not adequately address enterprise requirements for robust security, policy enforcement, and regulatory compliance


OTHER ON-DEMAND WEBINARS

Webinar: Information Security, HR’s Role in Protecting Vital Company and Customer Information

Firms of all sizes have a need to control sensitive information. Some companies may have confidential customer information that if lost could lead to legal liabilities and loss of customer confidence. Other firms are concerned about protecting valuable intellectual property. In either case, HR can play an important role in helping to maintain security. Our one hour webinar will focus on three significant aspects of information security: employee selection, monitoring and controls.This educational webinar has been submitted to the HR Certification Institute (HRCI) for 1 general hour of continuing education credit towards PHR, SPHR and GPHR certifications.When: Thursday, May 15, 2014, 1:00 PM–2:00 PM

Ransomware and Other Emerging Threats Within Healthcare Organizations

HIMSS Learning Center

The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actors. But, there is no guarantee that the data will be successfully recovered.

Security Trends Impacting Your Website

SiteLock

Please join SiteLock for our next webinar as we examine the latest cybersecurity trends and data from our 2019 Website Security Report. The report analyzes more than 6 million websites to determine the most prevalent cyberthreats websites face today, and provides unique insight into the top website risk factors and emerging trends for 2019. Hosted by SiteLock Product Marketing Specialist, Monique Becent, the webinar will cover: Attack patterns, Risk factors, Vulnerabilities, Malware.

Protect your organization from cyber attacks

Pluralsight

Security is everyone’s responsibility. With the threat of cyber attacks on the rise, growing concerns over data breaches and the high cost—both to your company’s reputation and bottom line—of a serious hack, you simply cannot assume everyone uses common sense all the time. Watch Pluralsight’s own head of information security, Trent Bond, in this eye-opening webinar where he covers best-practice tips every single member of your organization must know to stay safe, both at work and back home.

Spotlight

While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and management challenges with big data. Hadoop’s core specifications are still being developed by the Apache community and, thus far, do not adequately address enterprise requirements for robust security, policy enforcement, and regulatory compliance

resources