Critical Considerations for Building Capacity for Cyber Security

Find out the steps and considerations to enable the organization’s readiness in cyber security; and how to ensure response and recovery measures are ready for moments of crisis. Vivek Chudgar takes this on in our live webinar. He will examine how organizations can build a resilient security posture to proactively fight against critical security vulnerabilities that attackers could exploit.
Watch Now

Spotlight

Industrial-strength Protection. CYREN combats the growing malware threat with a system that maximizes user protection while minimizing the load placed on the underlying devices and software. CYREN Embedded AntiVirus provides the broadest possible defense against new and zero-hour threats, using the same trusted technology employed by Fortune 500 businesses. A modular design offers high performance through ultra-low processing, memory, storage, and bandwidth consumption. The solution is simple to integrate, and quickly upgrade; a Unified Engine shared by Antivirus and other CYREN security services, allows you to rapidly add new capabilities. And, our partner-driven business model offers flexible commercial arrangements and deployment models to fit your business needs.


OTHER ON-DEMAND WEBINARS

Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing

ZeroFOX

Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and botnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of shortened links, are the perfect venues for spreading machine-generated malicious content.We present a recurrent neural network that learns to tweet phishing posts targeting specific users. The model is trained using spear phishing pen-testing data, and in order to make a click-through more likely, it is dynamically seeded with topics extracted from timeline posts of both the target and the users they retweet or follow. We augment the model with clustering to identify high value targets based on their level of social engagement such as their number of followers and retweets, and measure success using click-rates of IP-tracked links. Taken together, these techniques enable the world's first automated end-to-end spear phishing campaign generator for Twitter.
Watch Now

Visualizing and Quantifying Cybersecurity Threats through Firewall Reporting

Dell

Every day, terabytes of big data traverse your firewall. How do you know it is doing its job intercepting viruses, spyware, intrusions, attacks, and filtering nefarious websites and web applications? Make your security policies more effective with firewall reporting. Learn how you can: Benefit from ways other companies use firewall reporting to be more secure. Make sense of the cyber-threats attacking your company with . firewall analytics.Analyze who has been doing what, where, when, and how on your firewall.
Watch Now

How to block malware, viruses and more – without breaking your budget.

Join this webinar to learn how to achieve both speed and protection for your network, while staying on budget. Organizations like yours are leveraging fast, affordable broadband to move to the cloud. And while you may use SSL to encrypt data, cybercriminals also use it to encrypt malware. Your high-speed network demands high-speed protection
Watch Now

THE ELECTED OFFICIALS GUIDE TO CYBERSECURITY AS RISK MANAGEMENT

CGI

State and local government technologists consistently identify cybersecurity as their top concern. But good cybersecurity strategy and planning requires involvement from more than technologists. Elected officials also must know and understand their unique fiduciary responsibilities and actively participate in risk mitigation. The challenge has been getting past the technical details and jargon in order to fully understand when and how to act.The Governing Institute invites you to join the states of Ohio and Minnesota and technology industry leader CGI, for a special webinar discussion of the recently published Guide to Cybersecurity as Risk Management: The Role of Elected Officials. (co-authored by CGI and Governing Institute). The benefits of easy to use checklists of the top cybersecurity action items for elected officials, agency executives and lawmakers.
Watch Now

Spotlight

Industrial-strength Protection. CYREN combats the growing malware threat with a system that maximizes user protection while minimizing the load placed on the underlying devices and software. CYREN Embedded AntiVirus provides the broadest possible defense against new and zero-hour threats, using the same trusted technology employed by Fortune 500 businesses. A modular design offers high performance through ultra-low processing, memory, storage, and bandwidth consumption. The solution is simple to integrate, and quickly upgrade; a Unified Engine shared by Antivirus and other CYREN security services, allows you to rapidly add new capabilities. And, our partner-driven business model offers flexible commercial arrangements and deployment models to fit your business needs.

resources