Cyber Due Diligence: Pre-Transaction Assessment Can Uncover Costly Risks

How can you ensure that an investment target isn’t one keystroke away from a major cyber incident or data breach? How can you be sure that an attacker isn’t already lurking in their network? CYBER DUE DILIGENCE conducted prior to investment can identify actual or potential cyber security lapses, areas that may be at risk, quantify remediation costs and help restructure an investment should substandard cyber security systems data or latent breaches be discovered. Join us for this online event and hear Kroll’s Tim Ryan describe how Kroll cyber experts can help uncover the cyber vulnerabilities you may be buying unwittingly, know if you are buying a company with an undisclosed data breach, and reveal breach-breeding weaknesses in the target company’s culture
Watch Now

Spotlight

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. Symantec has found security risks in a large number of self-tracking devices and applications. One of the most significant findings was that all of the wearable activity-tracking devices examined, including those from leading brands, are vulnerable to location tracking.


OTHER ON-DEMAND WEBINARS

ThreatSecure: Revolutionizing Advanced Threat Defense

"ThreatSecure is a revolutionary cybersecurity solution that will change how enterprises defend themselves against advanced threats. ThreatSecure can enable your organization to: · Detect malware others can't with industry leading behavioral analysis and machine learning algorithms that identify APTs, targeted attacks and Zero-days · Automate threat remediation by deploying custom remediation packages to compromised systems regardless of what endpoint security you use · Simplify threat protection by eliminating the noise of overwhelming alerts from disparate systems, enabling your team to quickly focus and respond to the biggest threats you face"
Watch Now

Look after your keys and they will look after you - The five steps to sound key

"Addressing virtually any of the current security mega-trends – government surveillance, privacy regulation, BYOD, cloud computing and big data - drives the need for more cryptography across core systems infrastructure and critical business applications. Whether encrypting sensitive data, strengthening IDs and credentials or digitally signing documents and software the actual security benefits you gain depend heavily on how you manage your cryptographic keys. Key management is not a simple task and it carries with it serious business continuity issues, real operational costs and is frequently a point of scrutiny for auditors. The days of using spreadsheets and thumb drives for managing cryptographic keys are numbered.During this session we will look at the types of keys that organizations have to manage, and how the key management challenge varies across multiple use cases in the enterprise. We’ll cover developments in the area of key management technologies, new standards that are emerging and preview the results of a global survey on the use of encryption and key management practices"
Watch Now

"TGIF, but how do you stop breaches on BYOD devices?"

palo alto networks

"If threat prevention is important to you, then it’s imperative to think about how to protect users when they leave the building. Your employees are working in a variety of locations and using their own BYOD devices. How can you make sure that security doesn’t go out the door when your users do? In this session, we’ll take a look at the threat landscape that the mobile workforce faces, and ways to address the risk using the Palo Alto Networks next-generation security platform. "
Watch Now

WEBINAR: THE BENEFITS OF DEPLOYING A FIREWALL MANAGEMENT TOOL ON PRODUCTIVITY & SECURITY

FireMon

In the fall of 2016, we sought the answer to a very simple question: What benefits do users who have a firewall management tool deployed with their firewalls see over nonusers? To find out, we commissioned Forrester Consulting to survey 188 IT security decision makers. In their study, “Automate Zero Trust Policy & Enforcement,” Forrester Consulting found that organizations with firewall auditing and configuration tools realize more benefits that those without,including.
Watch Now

Spotlight

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. Symantec has found security risks in a large number of self-tracking devices and applications. One of the most significant findings was that all of the wearable activity-tracking devices examined, including those from leading brands, are vulnerable to location tracking.

resources