Automotive Software Security Webinar

Intertek

Protect your product, your customers, and your brand’s reputation by securing the software embedded into your devices. “Vulnerability” is not a word you want to hear when taking a new product to market. Fortunately, with a little planning and some best practices in the testing and verification phase, you can feel secure knowing you did everything in your power to prevent a breach.
Watch Now

Spotlight

As more organizations turn to the “cloud” and the Software as a Service (SaaS) model for solutions to
address a wide range of business needs; security remains a top concern. This paper examines security
features of Software as a Service (SaaS) solutions and Ricoh’s Document Mall, a SaaS document
management solution


OTHER ON-DEMAND WEBINARS

Crash Course - PCI DSS 3.1 is here. Are you ready?

The Payment Card Industry Data Security Standard (PCI DSS) is continuously changing to protect user data from exposure. The most recent version, 3.1 will remain active until December 31, 2017. This presentation discusses the significance of PCI compliance in your business, the top 10 changes in 3.1 that will affect your application security program, and provides recommended activities to achieve compliance.

"Addressing Web Application Vulnerability with Integrated, Continuous Protection"

qualys

"Learn how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC), so you can: > Perform comprehensive, accurate scans — across all of development and deployment stages > Block attacks — and control where and when your applications are accessed > Prevent data breaches — and disclosure of sensitive information "

IT/OT CONVERGENCE AND INDUSTRIAL CYBERSECURITY

ISACA

Much has been written and presented on the topic of “IT/OT convergence”; a phrase used to describe the trend that is blurring the line between what have traditionally been well-differentiated classes of information technology based systems. The IT term has been retained as shorthand for the tradition business-oriented solutions, while the OT term has gained acceptance as a means of referring to the application of information technology in an Operations context (including automation). While this trend is well established, the full implications are still developing in areas such as the management and protection of systems against cybersecurity threats. The diversity of technologies involved ensures that there is effective collaboration across multiple disciplines. This webinar examines various aspects of this phenomenon and identifies specific implications for industrial control systems cybersecurity.

Endpoint Security: The Final Frontier

Cylance

Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.