Ask an expert: How to start and advance your cybersecurity career

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.
Watch Now



Threat Hunting Reimagined


Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and prevent the analyst from doing what they do best - hunt threats. Join our webinar and see firsthand how threat hunting teams can realize their full potential. With Devo, threat hunters can: Analyze real-time streaming and historical data at petabyte scale.
Watch Now

What Salesforce Customers Need to Know About China’s Data Security Law

On September 1st of this year, China’s Data Security Law went into effect, including strict guidelines on data residency. Combined with the existing Cybersecurity law and the PIPL regulation to come into effect on November 1st, this creates new requirements for data storage and processing. Companies that do business in China may need to keep some data in China only. This has significant implications for global companies that rely on Salesforce.
Watch Now

On-demand Webinar: IoT and Cybersecurity

Use your next 30 minutes to update you on IoT and Cybersecurity. During this on-demand webinar we are going to talk about Cyber security threats and challenges towards global or regional regulatory alignment? Standards and certifications Nemko Cyber Security Assurance services The schemes Key factors for the manufacturer to cover Common Criteria
Watch Now

The Critical Factors to Look for in a Cybersecurity Vendor

Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice.
Watch Now