ATTACK SIMULATION

Cybereason

This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology.  We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now

Spotlight

With this free e-book we would like to assist agencies, freelancers, website owners and WooCommerce shop operators to get an easy access to the most important contents of the EU’s upcoming General Data Protection Regulation (EU GDPR). In addition, we will show you some practical case examples such as tracking, email marketing and WordPress plugins. In this guide, you will also find concrete task instructions and a checklist, which will help you to get your business and your WordPress website ready for legal compliance with GDPR right on time.

OTHER ON-DEMAND WEBINARS

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

How to prepare against attacks from the dark web

Join this webinar to find out more about how to prepare your business against the perils that lurk within the dark web. We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch Now

Spotlight

With this free e-book we would like to assist agencies, freelancers, website owners and WooCommerce shop operators to get an easy access to the most important contents of the EU’s upcoming General Data Protection Regulation (EU GDPR). In addition, we will show you some practical case examples such as tracking, email marketing and WordPress plugins. In this guide, you will also find concrete task instructions and a checklist, which will help you to get your business and your WordPress website ready for legal compliance with GDPR right on time.

resources