Anatomy of Container Attack Vectors and Mitigations

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cybersecurity Insurance

As a result, Cybersecurity Insurance providers are tightening their requirements and costs at renewal time. This is causing a perfect storm for many organizations. This on-demand webinar covers the new requirements we’re seeing. We also discuss options to utilize Microsoft technologies, which you may already own, to meet those requirements and help keep your organization safe through reduced risk.
Watch Now

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now