Cyberattack Prevention for the Water & Wastewater Industry

Cyberattack Prevention for the Water & Wastewater Industry
America’s Water Infrastructure Act (AWIA) mandates (drinking) water systems serving more than 3,300 people to improve cybersecurity measures no later than six months after certifying the completion of a risk and resilience assessment.

It is important to understand the various dimensions of the challenges in cyber securing water and wastewater treatment plants before we establish a roadmap to manage cyber threats, risks, and breaches.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Controls are the Key to Cybersecurity Management Success

Controls are the critical foundation of an effective enterprise cybersecurity program. With more threats, more systems to protect, more tools to deploy and more people to manage, there is constant pressure to move faster and keep up with the ever-changing risk landscape. As a result, there is a need for the organization to have the proper controls in place to manage cybersecurity threats and risks across applications, systems, facilities and third parties.
Watch Now

Global Survey of Cybersecurity Leaders: Benchmarking Security Gaps & Privileged Access

Learn from your industry peers’ journeys to protecting privileged identities, stages of privilege access security, what they have achieved so far, and how to get the most value out of your cybersecurity investment. More than 2000 IT security leaders around the world shared their insights to create this research study. The broad reach of this study provides an opportunity to compare the PAM-related activities and attitudes of IT security practitioners with varying levels of responsibility, in different countries, industries, and companies of all sizes.
Watch Now

How to Remain Secure, Protect Data, and Stay Compliant in the Face of End of Life Operating Systems

Carbon Black

The ever-changing threat landscape continues to challenge businesses who attempt to protect critical data, improve security posture, and remain compliant. That challenge is intensified when adding the constant risk of operating systems going end of life and pushing endpoints out of compliance against many modern data security laws, regulations, and compliance policies. The risk is too great and businesses can no longer afford to take a passive stance when it comes to maintaining system endpoints and ensuring that vulnerabilities are in check.
Watch Now

Turning the Tables on Cryptojacking

Malwarebytes

It seems that criminal hackers are always a few steps ahead of everyone else and the recent onset of cryptojacking is a great example. In this webinar, independent information security consultant, professional speaker, and writer of Hacking For Dummies, Kevin Beaver, outlines what cryptomining and cryptojacking are and how they impact your business. He discusses strategies and tactics that you can use to ensure that your network and computer cycles are not used for someone else’s gains. From security policies and standards to endpoint controls to user training, this latest malware craze can be beaten but you must first understand it. Watch the replay and leave better prepared to address this threat.
Watch Now