ARC, Nozomi Webinar on Cybersecurity and IT/OT Convergence

Convergence of Different Organizations with Different Values. Convergence has obvious implications for cybersecurity. OT’s focus on non-stop operations and eliminating unscheduled downtime is raising the cybersecurity issue on the IT side, and increased data from IT is raising the same issue on the OT side. Each organization’s behavior is driven by what they value, how they think, and how they are rewarded. OT professionals prioritize availability over everything else. This includes systemwide integrity and security. Unless the few-and-far-between upgrades are going on, system access is generally limited, and the environment is stable.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Could it be easier to manage O365 and remote users?

Digital transformation is here and is now a hot topic due to the increase in remote work. How do IT pros continue to support the workforce while everyone is working remotely? Register now to learn: What free tools you can utilize to improve productivity of Microsoft Teams How you can monitor Teams adoption, and easily triage que
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies

IBM

Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential information across hybrid and multi-cloud environments can overwhelm even the savviest of security and IT teams, especially when resources are scarce. However, data security defenses don’t have to be costly or overly complex to carry out.
Watch Now