"Critical Capabilities for Office 365 Security"

In this webinar, Rich Campagna, VP Products at Bitglass, and Salim Hafid, Marketing Manager, will help you understand where Microsoft’s security responsibility ends, and where yours begins, highlighting key gaps to keep in mind as you make the move to Office 365, and how to solve them. CPE Credit available for attendance
Watch Now

Spotlight

The mobile telecommunications industry is under significant threat. Today’s threats are a realisation of traditional IP based threats within the all-IP 4G network combined with insecure legacy 2/3G generations. Moving into the 5G era the threat landscape will increase due to the new services and technologies being introduced. Continued underinvestment in appropriate technology, processes, and people has resulted in numerous threats being realised against operators. These threats will only increase as the industry diversifies its services.


OTHER ON-DEMAND WEBINARS

Becoming a Threat Hunter in Your Enterprise

ExtraHop

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.

"Threat Update: SYNful Knock - A Cisco Implant"

"SYNful Knock, once a theoretical cyber attack, is now a reality. This Cisco router implant was recently discovered in multiple organizations and several countries. Based on research from Mandiant, a FireEye company, we believe this is just the first of many possible router implant techniques and expect similar attack methods to become more popular and sophisticated in the future. In this webinar, you’ll learn about the malware and its capabilities, as well as tools to detect the threat in your organization. Join us to discover: - How SYNful Knock works - Why SYNful Knock is so difficult to detect, even when you suspect an implanted router - How you can better detect and foil SYNful Knock - What future variants of this attack might look like"

3 Steps to Gain Control of Cloud Security

Security Boulevard

The cloud is a notable business advantage, but it does bring numerous security concerns. Among them: Lack of visibility across cloud or between on-premises and cloud environments. Monitoring security controls and changes within cloud and multi-cloud environments. Maintaining compliance by monitoring cloud traffic for suspicious and non-compliant behavior. It becomes increasingly complex in hybrid environments, because now you’re managing security for on-premise, cloud, virtual, container environments, and more. The time commitment can feel staggering.

How to Access Finance for your Cyber Security Start-up or Scale-Up

CYBERBIT

Headlines and the increasing need for cyber security solutions are fuelling unprecedented growth in the sector. The vibrant and innovative start-up sector is seeing the development of new and exciting tools and products. But how does a start-up raise the finance it needs to take the business to the next level and turn this innovation into revenue and business success? This panel of venture capitalists and successful entrepreneurs will share best practice and insight into how cyber security start-up can gain access to finance including:

Spotlight

The mobile telecommunications industry is under significant threat. Today’s threats are a realisation of traditional IP based threats within the all-IP 4G network combined with insecure legacy 2/3G generations. Moving into the 5G era the threat landscape will increase due to the new services and technologies being introduced. Continued underinvestment in appropriate technology, processes, and people has resulted in numerous threats being realised against operators. These threats will only increase as the industry diversifies its services.

resources