Cyber Security: Protecting Assets

With viewers consuming content on an increasing array of devices and platforms and the virtualisation of workflows, the task of protecting assets has never been so complicated and costly. Add to this the fact that the media industry is a high-profile target for hackers and it becomes clear that cyber security is at the top of the agenda for all those involved in the media supply chain. Join this IBC365 webinar, sponsored by Juniper Networks, to hear from senior industry figures who will examine where the weaknesses lie in the production, delivery and distribution workflow and consider what can be done to address vulnerabilities and make sure that film and TV is consumed as intended by broadcasters, platforms and content owners.
Watch Now

Spotlight

Everything you need to know about the Capital One data breach, changes in the payouts from the Equifax settlement, and Nextdoor app scams. The Weekly Blaze podcast is your update on the top 3 security and privacy news stories from the past week. These podcasts are published every Monday and are 15 m


OTHER ON-DEMAND WEBINARS

Why Your WAF Will Eventually Fail You

GovInfoSecurity

A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basic and/or outdated WAFs could be risking your data to theft, customer satisfaction issues and detriment to your brand reputation. In order to protect your organization from today's evolving threat landscape, you need a WAF that incorporates much more such as solutions for API security, advanced bot management and malware protection.

Turning the Tables on Cryptojacking

Malwarebytes

It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.

On-Demand Webinar: Steps to ensure your organization’s software security

Organizations today face increasing threats to their data, from ever-more nefarious, cutting-edge hackers who put any large company with a website or an app at risk.But there are steps that can be taken to thwart the theft of digital data:Ensure compliance to standards. There are several code security standards out there, but the question is, how do organizations understand what they mean and apply them to their own software development efforts.Identify security flaws across the organization. Code coming from your developers, COTS and (most suspect) open source can all have potentially damaging flaws.Stay informed with reporting and metrics. Organizations must measure and gauge the effectiveness of their defect reduction efforts.

Key Steps to Identify Risk & Master Vendor Risk Management

BitSight

In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte, 83% of today’s business leaders lack confidence in third-party VRM processes. Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program.