BYOID: New Ponemon Institute Study on Key Digital Identity Trends

"While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud."
Watch Now


Threat actors conceal their attacks in SSL traffic to evade corporate defenses. Palo Alto Networks Security Operating Platform provides ironclad protection against cyberattacks, while eliminating blind spots introduced by encrypted traffic. Magnifier behavioral analytics, a cloud-based app for the Application Framework, empowers


Death of Windows XP Gives Life to Hackers


"If you're a small- or medium-sized business running Windows XP, you've likely heard that support will be cut off for the 13-year-old operating system in less than three weeks. But you may not have heard what impact that will have on your company's security and compliance. Watch this important webinar to learn: What Windows XP ""end-of-life"" exactly means to the security of your business. Why you should especially care about this if you take credit cards for payment. How you can safeguard your business and remain compliant."

Next-Gen Now: Outsmarting rootkits, ransomware, and zero-day attacks.


From rootkits to ransomware, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work, and how to protect against them. Join Dan Schiappa, GM for Sophos Enduser Security Group, for a live webcast on Next-Generation Enduser Protection and learn how you can get innovative endpoint protection without impacting performance. Prevent: stop the exploits before they hit by thwarting the attack methods of attacks used by advanced persistent threats.

Cyber security and the protection of assets

Juniper Networks

With viewers consuming content on an increasing array of devices and platforms, and the media industry a high-profile target for hackers, the task of protecting assets can be complicated and costly.

Crisis Communication After an Attack

FireEye, Inc.

Crisis Communication After an Attack Are you prepared? It’s headline news. Cyber attackers are increasingly more sophisticated and data breaches are becoming common place. Some say “it’s not a question of if you’ll be breached, but when”. You need a plan. Even the most security-conscious organizations are not prepared for the necessary actions needed to gain control after a cyberattack. Preparing an emergency response communication plan keeps stakeholders informed following a breach.