After updatein The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk


As organizations increase their reliance on third-party vendors for outsourced solutions, they expand their attack surface. Today’s digital environment offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organizations around the globe — and their numbers continue to rise. The tips discussed in this webinar will help you start managing third-party risk to centralize your program and get a preliminary perspective of the risks you face. Once this foundation is established, you can build on it and shift to a more proactive approach to managing third-party risk — and limiting your exposure.
Watch Now


A 3-Year Program to Help Hospitals and Health Systems Establish, Implement and Mature Your Cybersecurity Program to Achieve Self-Sufficiency.


Securing Organizations from Remote Desktop Protocol Exploits


Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now

Highly Caffeinated InfoSec

Black Hills Information Security

Whether you are brand new to InfoSec or a skilled veteran there are ways to push the limits and learn more about this exciting profession. Knowledge doesn’t always come from a classroom but instead can come from networking with other cybersecurity individuals and finding ways to hack anything around you. Mike Felch and Beau Bullock have started various InfoSec meetup groups, spoken publicly, written blog posts, and are on podcasts to help share and learn more at the same time. In this webcast they share a few tips for waking up your inner hacker.
Watch Now

10 Incredible ways you can be hacked through email and how to stop the bad guys


Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now