Benchmarks for Corporate Cybersecurity

SIA

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.
Watch Now

Spotlight

Mimecast Mobile gives you access to your email wherever you are, even if you’ve deleted it or your mail server is down http://mim.ec/1Z5EbAd. The Mimecast Mobile app gives you access to your Mimecast Online Inbox, Mimecast email archive, and a range of productivity features – straight from your iPhone, iPad, Android, Windows or BlackBerry device. Search your archive, restore emails and reply to or forward messages in the archive – providing virtually instant on-the-go access to every email you’ve ever sent or received. The app also means you can carry on using work email as normal when the connection to your primary email server is lost.

OTHER ON-DEMAND WEBINARS

Why Use a Cloud Managed Service Provider?

FuseForward

If you’re about to embark on your cloud journey, the first decision you will need to make is whether to undertake the project in-house or outsource it to a Managed Service Provider (MSP). To help you make this important decision, we’ve recorded a free on-demand webinar. In twenty minutes, our CEO Mark Damm and Solutions Engineer Ray Jung, will walk you through the ways an MSP can help address your key cloud concerns.
Watch Now

Cyber Value-at-Risk Webinar

Uleska

Cyber Value-at-risk (VAR) offers a revolutionary industry approach helping Enterprises with effective cyber management and vulnerability remediation prioritization. Simply classifying risks in broad terms such as “high”, “medium” or “low” does not tell you a business story. Understanding the business impact of various technical cyber issues, including responses costs, replacement costs, and potential regulatory fines, allows a business vision into true cyber business risk. Why attends this webinar? 1) Understand how cyber security compliance issues can be subject to regulatory fines.
Watch Now

Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack

Cybersecurity Ventures

When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now

Spotlight

Mimecast Mobile gives you access to your email wherever you are, even if you’ve deleted it or your mail server is down http://mim.ec/1Z5EbAd. The Mimecast Mobile app gives you access to your Mimecast Online Inbox, Mimecast email archive, and a range of productivity features – straight from your iPhone, iPad, Android, Windows or BlackBerry device. Search your archive, restore emails and reply to or forward messages in the archive – providing virtually instant on-the-go access to every email you’ve ever sent or received. The app also means you can carry on using work email as normal when the connection to your primary email server is lost.

resources