Cybersecurity in a Cloud-Based World

RedVector

Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure. Provide simple actions (ex. browser settings) that can be taken to protect against hacks.
Watch Now

Spotlight

"As enterprise adoption of mobility moves forward, the growth of the Internet of Things (IoT) presents
the next evolution in computing. The impact of these trends in terms of increased risk to the business is
straining existing security infrastructures. Enterprises need a dynamic and flexible security framework
to balance risk and trust. This need has led to the rapid expansion and growth in enterprise security
technologies for mobility. To balance costs with needs, however, the enterprise needs to know which
technologies to invest in. It also needs to know whether to rely on one, a combination of technologies,
or to take a unified approach. While making these decisions, the biggest challenge for the enterprise is
balancing user needs with enterprise requirements and regulations. In this whitepaper, we will review the current state of the mobile enterprise, lessons learned with existing tools, and how a unified approach to application and access management balances the needs of the end user and the enterprise."

OTHER ON-DEMAND WEBINARS

Hacker vs CISO: How to Exploit/Protect the WFH Workforce

A Former Hacker and a Current CISO Face Off In today’s world where entire workforces were forced to move to an entirely remote work environment overnight, IT security leaders are facing new cyber attacks every day. Not only have hackers and adversaries become more sophisticated over the past decades, the hastily distributed work
Watch Now

How to Establish Visibility, Governance and a Security Culture for Multi-Cloud

Dimension Data

Is cloud security your top priority, or it is languishing somewhere on a never-ending to do list? A user-driven cloud revolution has left IT and security professionals struggling to establish visibility of data and services, and unable to regain control of the risks associated with dispersed data and multiple cloud identities. So how should organizations regain control and begin putting the “frogs back into the box” for multi-cloud security? In this webinar, we will look at how to get ahead with cloud, build a ‘cloud culture’ into your business, underpinned by a platform approach to avoid further complicating the picture to get the most from the cloud, whilst also managing the challenges of data everywhere, multiple cloud identities, mobile connections and global compliance.
Watch Now

NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now

Breaking the phishing line

WorkCast

It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish. Why? Because it is fast, easy, and despite security training, users still click on attacks. This 20/20 webcast looks beyond user training at how technology can address the challenges of modern phishing without reducing productivity or presenting users with potentially problematic emails.It’s no surprise that phishing and business email compromises, commonly called CEO Fraud, continue to flourish. Why? Because it is fast, easy, and despite security training, users still click on attacks.
Watch Now

Spotlight

"As enterprise adoption of mobility moves forward, the growth of the Internet of Things (IoT) presents
the next evolution in computing. The impact of these trends in terms of increased risk to the business is
straining existing security infrastructures. Enterprises need a dynamic and flexible security framework
to balance risk and trust. This need has led to the rapid expansion and growth in enterprise security
technologies for mobility. To balance costs with needs, however, the enterprise needs to know which
technologies to invest in. It also needs to know whether to rely on one, a combination of technologies,
or to take a unified approach. While making these decisions, the biggest challenge for the enterprise is
balancing user needs with enterprise requirements and regulations. In this whitepaper, we will review the current state of the mobile enterprise, lessons learned with existing tools, and how a unified approach to application and access management balances the needs of the end user and the enterprise."

resources