ATTACK SIMULATION

Cybereason

This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology.  We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now

Spotlight

Mobile devices have become increasingly attractive targets for hackers looking to exploit the sensitive personal information they store. This shouldn’t come as a surprise either, given the sheer amount of time and information we all put into our personal and organizational devices. So, whether your organization develops mobile apps or is simply full of mobile end users, how secure are the apps on your network? Chances are you’re not totally secure, with 1 in every 36 mobile devices being compromised in some way by a mobile security threat. From gaining access to microphones, cameras, and GPS data to building convincing clones of other apps with the intent to trick users into downloading malware — hackers are constantly after valuable mobile app data, and they have a lot of sneaky strategies to help them get it.

OTHER ON-DEMAND WEBINARS

Understand and Protect the Modern Attack Surface

Cylance

Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discuss best practices for minimizing and protecting these critical aspects of your attack surface.
Watch Now

Cybersecurity Ratings Part 3: The Third Way

BitSight

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now

Ask the experts: What’s the worst web application security issue?

Synopsys

We know. It’s an impossible question to answer. There’s no such thing as a “worst web application security issue,” because every app and every organization has its own unique set of issues. But if you’re a development organization with limited resources, how do you know where to start? Which issues appear over and over in data breaches, exploits, and top N lists such as the OWASP Top 10? We asked some experts—and Twitter—to give us their opinions.
Watch Now

Navigating the IT Security Certification Labyrinth

udemy

Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathway for you and your team?
Watch Now

Spotlight

Mobile devices have become increasingly attractive targets for hackers looking to exploit the sensitive personal information they store. This shouldn’t come as a surprise either, given the sheer amount of time and information we all put into our personal and organizational devices. So, whether your organization develops mobile apps or is simply full of mobile end users, how secure are the apps on your network? Chances are you’re not totally secure, with 1 in every 36 mobile devices being compromised in some way by a mobile security threat. From gaining access to microphones, cameras, and GPS data to building convincing clones of other apps with the intent to trick users into downloading malware — hackers are constantly after valuable mobile app data, and they have a lot of sneaky strategies to help them get it.

resources