How to prepare against attacks from the dark web

cshub
Join this webinar to find out more about how to prepare your business against the perils that lurk within the dark web. We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch Now

Spotlight

Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit, and a Computer and Information Science degree with a major in Cyber and Network Security could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.

OTHER ON-DEMAND WEBINARS

The Future of Phishing: It’s all about your customers

SEGASEC

While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.
Watch Now

The Path Forward for Cybersecurity's AI: Not All AI Are Created Equal

Bank information security

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.
Watch Now

Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Spotlight

Do you want to stop cyber-crime before it starts? If preventing, detecting, and battling digital crime is important to you, a career in cyber security may be the perfect fit, and a Computer and Information Science degree with a major in Cyber and Network Security could be a great way to start! As a cybersecurity specialist, you could be on the front lines of cyber warfare and defense, protecting vital computer systems against inside and outside threats alike, including social engineering, hackers, malware, spyware, and viruses.

resources