Black Hills Information Security
Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there is a prevalent attitude that it is somehow possible to get endpoint security with full synergy and it will be bulletproof and under a single pane of glass. All with cyber threat intelligence and A.I. sprinkled in with a bit of EDR magic to stop all attacks.
Watch Now
IBM
In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now
BankInfoSecurity
The number of cyberattacks on financial institutions (FIs) cannot be overstated. In the past year, there have been more than one billion cyberattacks on financial institutions. That is three hundred times more than any other industry, such as retail, insurance, or healthcare. At an average cost of $18 million dollars for each successful attack, what are you to do? How do you combat this aggressively growing threat? In this webinar, OneSpan and ISMG will summarize key findings from a recent study that surveyed the state of adaptive authentication from over 150 FIs and what techniques can be taken to mitigate the increasing rate of cyberthreats.
Watch Now
With the increase in data breaches, cybersecurity continues to be a hot issue. It's critical that you understand your vendor's cybersecurity posture to protect your organization in the incident of a cybersecurity threat or attack. The time to prepare is now!
This session will discuss what to ask for from your vendors, how to review a vendor's cybersecurity, and what you can do as an organization to stay prepared.
Watch Now