Cybersecurity: Before, During and After a Breach

Today, 80% of corporate assets are likely virtual, dramatically increasing the risk of cybercrime. In this webinar you will learn how business continuity professionals can prepare for the possibility, mitigation and follow up in the case of a cyber breach.The webinar will focus on providing essential, accurate, and timely information to stakeholders before, during, and after a breach. You’ll learn to identify and prioritize your target audiences, and engage the proper channels of communications for effective internal and external communications. You’ll find out why it’s important that response evolves beyond traditional communication outlets, like press releases and conferences, to new communications venues like social media, Internet, intranet, email, text messaging, mass notification, and toll-free lines.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cyberattack Prevention for the Water & Wastewater Industry

America’s Water Infrastructure Act (AWIA) mandates (drinking) water systems serving more than 3,300 people to improve cybersecurity measures no later than six months after certifying the completion of a risk and resilience assessment. It is important to understand the various dimensions of the challenges in cyber securing water and wastewater treatment plants before we establish a roadmap to manage cyber threats, risks, and breaches.
Watch Now

Investigating the Hacker Lifecycle

AITP

One of the hottest topics at RSA San Francisco 2019 was the Mitre ATT&CK framework. Along with the Lockheed-Martin Kill Chain, it has become a standard reference model for cybersecurity professionals. Specifically, it is used to describe each stage of an attack. Pen testers, security analysts and Security Operations Center (SOC) professionals must learn how to mature their operations, as well as hone the skills of red team and blue team workers.
Watch Now

Top 5 Cybersecurity Misconceptions

Alpine Security

Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now

Debunking 7 Myths About AI in Performance Management

Generative AI has taken the world of work by storm, and left many HR leaders wondering how to best apply it to HR processes — or if we even should. Considerations around privacy and bias are factoring into adoption of AI in performance management, and many business leaders simply don’t know how to determine whether it’s worth th
Watch Now