Cybersecurity checklist essentials for accounting firms

Cybersecurity checklist essentials for accounting firms
Did you know that security is consistently listed as one of the AICPA’s top technology concerns? And did you know that security breaches most often happen due to human error? 

What can you do to mitigate cyberthreats and keep sensitive information secure in your firm?
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

OTHER ON-DEMAND WEBINARS

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life. The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills. This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

Harmonizing DNS Security and Secure Web Gateways

Have you joined the debate yet? Many have differing views on whether Secure Web Gateway (SWG) and DNS security are competing technologies and which they should deploy. We are diving into this subject in this webinar where we’ll explore the intersection between the two, the pros and cons of each, and what their gaps might be.
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

resources