Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now


Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield powered by Intel® vPro™ Platform is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees sta


Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention


This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.
Watch Now

[RSA Fireside Chat] Stop Ransomware Attacks with “Assume Compromise” Mentality

Cybercriminals are always on the lookout for opportunities to profit from security weaknesses. Meanwhile, the COVID pandemic lead accelerated cloud transformation has rendered many of the assumptions of legacy security approaches obsolete. Enterprises are realizing that modern cyber-attacks won’t be stopped by a purely preventive strategy. In fact, it’s almost a given that with sufficient time, motivation, and resources an attacker will always find a point of entry.
Watch Now

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

Top 5 Cybersecurity Misconceptions

Alpine Security

Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now