Can We Rein in the Global Cybersecurity Crisis?

The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Thinking Like a Cyber Attacker: Strategies for Defense

Veracode

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps

Trend Micro

Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.
Watch Now

A Modern & Secure Approach for Cyber Security Operation Centers

With 17,000 new cyber security threats discovered every week, finding a solution that improves flexibility, workflows, and the consolidation of data — while maintaining highly efficient monitoring and management capabilities is a must. This roundtable webinar brings Subject Matter Experts from Userful and Swimlane. The panel will discuss the importance of flexible solutions for Cyber Security Operations Centers, improvements for how your SOC manages and monitors critical security applications, and will recommend ways to improve the exchange of real-time data and collaboration between operators.
Watch Now

How To Create a Successful Cyber-Security Policy

DP Solutions

As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security policies: a series of rules that define what end users may or may not do with their technology. In this on-demand webinar, DP Solutions’ Senior IT Risk Advisor Ben Schmerler discusses how to develop a solid and reasonable policy for your organization. From this webinar, you will learn: What information should be covered in your policies. Special considerations such as mobile devices, social media, compliance or legal concerns. How to properly document your policies. How to determine if your employees are following the policies. Technology options to enforce the policies.
Watch Now