Critical Actions to Survive a Data Breach in 2019 & Beyond

Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyber attacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

After updatein The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

BitSight

As organizations increase their reliance on third-party vendors for outsourced solutions, they expand their attack surface. Today’s digital environment offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organizations around the globe — and their numbers continue to rise. The tips discussed in this webinar will help you start managing third-party risk to centralize your program and get a preliminary perspective of the risks you face. Once this foundation is established, you can build on it and shift to a more proactive approach to managing third-party risk — and limiting your exposure.
Watch Now

Moving Beyond Blindspots: How to Reduce Security Risks in the Cloud

Understanding your complex cloud environment is tricky. Workloads, containers, and serverless functions are added and removed constantly. Vulnerabilities are endless. Security staff is in short supply. But here’s the reality: cloud security is built in incremental steps. And process improvement involves multiple stakeholders — not just security teams.
Watch Now

Top 5 Cybersecurity Misconceptions

Alpine Security

Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now

Cloud Security Strategies for Today’s Enterprises

The typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual providers. In this webinar, experts discuss the specific tools and best practices to manage security in the cloud environment. You’ll learn technologies and strategies to safely move data into the cloud, enforce policies across different platforms, and monitor data in the cloud. You’ll walk away with recommendations on ways to securely manage cloud environments, even across multiple vendors.
Watch Now