ATTACK SIMULATION

This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology.  We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now

Spotlight

Robust and secure digital infrastructure is essential to enable the Industry 4.0 transformation. It connects systems, allowing data to be correlated and analyzed to make factories smarter, more profitable, safer, and more sustainable. Smart factories, with their array of machines, sensors, and controllers, are the future. They r

OTHER ON-DEMAND WEBINARS

Learn the Ins and Outs of a Security-Aware Culture from a Forrester Expert

MediaPRO

Developing and maintaining a security-aware culture in an organization has become vital in the defense against modern cyberthreats. But such a culture cannot be expected to develop overnight. Building such a culture is a journey, not a miracle, with many pitfalls along the way. That’s why we’re here to help. Watch our on-webinar Harden the Human Firewall by Building Awareness, Behavior, and Culture, with MediaPRO Chief Learning Officer Tom Pendergast guest speaker Forrester analyst Jinan Budge to learn how to instill a culture of security through an engaging, meaningful, and even entertaining security awareness program.
Watch Now

Answers To Hard Security Questions For Executives, By Executives

Knowing about cybersecurity risks is half the battle - get the hard facts from these executives who successfully met the challenge of the US Cyber Command. Hear from these cyber security former military leaders and see how they achieved answers to the hardest questions by the world’s most relied-upon forces.
Watch Now

The Role of Human Error in Information Security

PECB

It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on the root cause and prevention tips resulting from these events.
Watch Now

Cybersecurity and Robotics Systems: Vulnerabilities and Solutions

Our Research Analyst, Satyajit Sinha will be speaking at the RoboBusiness Webinar on July 9th 2020 at 2 PM EST. The topic of the webinar is “Cybersecurity and Robotics Systems: Vulnerabilities and Solutions”. One class of edge products, rarely mentioned in the typical IoT discussions and analyses, also provide for actuation. That is, they are robotic devices. Like other ‘connected’ IoT devices, robotics systems are open to security threats, which can be one roadblock to their widespread deployments. In this session, Counterpoint Research’s Satyajit Sinha will discuss current and future cyber security threats to networked robotics systems, highlighting their vulnerabilities in the process. He will also describe various cyber security solutions and provide a competitive landscape of security solutions for robotics systems.
Watch Now

Spotlight

Robust and secure digital infrastructure is essential to enable the Industry 4.0 transformation. It connects systems, allowing data to be correlated and analyzed to make factories smarter, more profitable, safer, and more sustainable. Smart factories, with their array of machines, sensors, and controllers, are the future. They r

resources