California Consumer Privacy Act: Are You Prepared for 2020?

InfoSec Institute

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to have wide-reaching impact.
Watch Now


Are you aspiring to work in the cyber security industry but lack coding skills? Is it really a must-have skill to possess? Find out as Watchman explains the situation.


Bridging the gap between on-prem and AWS security


As more organizations use a combination of their on-premises network and Amazon Web Services (AWS) to deliver services and applications, they are struggling to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy these requirements in an efficient, cloud-native way to ensure security is effective.
Watch Now

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

2022 Cyber Challenges & Industry Intelligence Study

The modern security organization is fueled by intelligence, advanced technology, and more knowledgeable professionals than any other point in history. However, the endless war that started at the dawn of connectivity often sees the same challenges as we do today and much of this stems from the misconception that organizations must fight threat actors on their own. This myth continues to create siloes, both internally and externally, and prevents teams from gaining necessary threat visibility or reducing overloaded analysts workload.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now