Benchmarks for Corporate Cybersecurity

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

OTHER ON-DEMAND WEBINARS

Uncovering the Ugly Truth of OT Cybersecurity

Newly discovered vulnerabilities in industrial control systems (ICS) are targeted more than ever. In fact, the number of ICS-CERT advisories increased by 56.2% from 2020 to 2021 according to the TXOne Networks 2021 Cybersecurity Report. Many of these systems include legacy devices that were designed before cybersecurity became a serious concern, leaving them highly susceptible to emerging threats.
Watch Now

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

Cybersecurity webinar series - IT security under attack

"A single vulnerability is all an attacker needs"~ A cybersecurity saying that fits with the facts even till date. Security incidents frequently make the headlines, and it is always a surprise when the walls of highly protected infrastructures are breached. More often than not, when security attacks happen on organizations, investigative reports only reveal the less intrusive details, and avoid disclosing confidential information that may impact IT security.
Watch Now

THE CYBERSECURITY CHALLENGE IN CEE - KEY REPORT FINDINGS

CMS

We will be hosting a live webinar on Monday 10 December 2018 at 4pm CET to discuss some of the key findings in the report. Moderated by John Malpas, Publishing Director at Legal Week, the panel will be joined by Andrea Simandy, European Data Protection Attorney at Microsoft, Dora Petranyi, CEE Managing Director at CMS and Dominic Carman, Writer and Consultant, who worked with the Legal Week Intelligence team on the research and writing for the report.
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

resources