Best practices to improved protection from advanced threats

Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
Watch Now

Spotlight

The course Designing and Executing Information Security Strategies by from University of Washington will be offered free of charge to everyone on the Coursera platform.


OTHER ON-DEMAND WEBINARS

‘Tis the Season for NERC CIP V5 Transition

Tis the season! Compliance with North American Electric Reliability Corp (NERC) Critical Infrastructure Protection (CIP) Standard Version 5 is only a few months away - April 1, 2016. In this webinar on transitioning to NERC CIP V5 we will share insights on cyber security for bulk power grid networks including: •Overview of NERC CIP V5 Standards •Strategies and tools for meeting the new Cyber Security Standards •Industry trends on transitioning to compliance including polling results Join utility-industry network security expert Chris Beyer, Co-Founder and CTO, Synacktek, and Tufin to learn how your colleagues in the power companies and network security professionals are ramping up for this important transition to the new standards

Turn The Tables on Cybercrime: Use the Kill Chain® to your Advantage

"Cyber criminals are organised and well-funded and just like any innovative commercial business, these organisations have a business plan and an operating framework to ‘go to market’. If we understood how they go about targeting individuals at organisations like yours with the end goal of stealing valuable sensitive data, perhaps we might change the way we protect our users. The good news is that there is a common operating framework that cybercriminals work towards known as the Cyber Kill Chain®. It’s time to play the cyber criminals at their own game! Join, Proofpoint, Fujitsu and Bloor Research on this webinar as they provide practical advice on how to interpret the 7 stages of the Attack Chain and use this knowledge to review the way you prepare, protect, detect & respond to cyber criminals targeting your organisation."

Security Transformation: The Current Evolution and How to Manage It

The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years

Reduce the Attacker’s ROI with Collaborative Threat Intelligence

AlienVault

"The cost to attack and compromise a system is orders of magnitude less than the cost to defend. A single machine can target thousands of targets searching for one with susceptible defenses while each new attack vector requires defenders to deploy and maintain additional security controls. So, how can we increase the cost for the attacker? One way is through collaborative threat intelligence. Join Wendy Nather of 451 Research and Jaime Blasco, Director of AlienVault Labs for a discussion of the value of collaborative threat intelligence. Wendy and Jaime will discuss how a collaborative approach differs from other threat intelligence sources, along with practical considerations to help you evaluate threat intelligence offerings and protect your environment."