Cybersecurity: Bridging the Gap Between Physical Security and IT / IoT

Dell EMC

On Monday, Dec. 11, as part of the SIA Webinar series, a webinar titled Cybersecurity: Bridging the Gap between Physical Security and IT/IoT covered best practices from edge to core hardening, bridging cyberprotection techniques, and technologies that help unify disparate technologies into a common cybersecurity framework. Speakers Vince Ricco (Axis Communications) and Ken Mills (Dell EMC) discussed how successful practitioners are hardening the physical security edge, enabling the authentication of devices systemwide and utilizing IT and IoT methodology to secure the enterprise.
Watch Now

Spotlight

It seems a day can’t go by without a new cyber attack making the news. Fifty US banks were recently infected with the Trickbots Trojan. In 2016, cybercriminals stole $81,000,000 from the Bangladesh Bank by exploiting a pair of second hand routers.

OTHER ON-DEMAND WEBINARS

Cybersecurity in a Cloud-Based World

RedVector

Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure. Provide simple actions (ex. browser settings) that can be taken to protect against hacks.
Watch Now

A CIO’s guide to maximizing the value of integration and APIs

From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar, Forrester consultant Corey McNair and M
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

10 Incredible ways you can be hacked through email and how to stop the bad guys

WorkCast

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Spotlight

It seems a day can’t go by without a new cyber attack making the news. Fifty US banks were recently infected with the Trickbots Trojan. In 2016, cybercriminals stole $81,000,000 from the Bangladesh Bank by exploiting a pair of second hand routers.

resources