Cybersecurity Insurance

Cybersecurity Insurance
As a result, Cybersecurity Insurance providers are tightening their requirements and costs at renewal time. This is causing a perfect storm for many organizations.

This on-demand webinar covers the new requirements we’re seeing. We also discuss options to utilize Microsoft technologies, which you may already own, to meet those requirements and help keep your organization safe through reduced risk.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Mid-year Data Breach Update: How the Latest Cyberthreat Trends Can Impact Your Identity Security

Last year saw a historic number of data breaches that exposed the personal information of millions of individuals to possible risk. In our new 15-minute webinar, we’ll be joined by the Identity Theft Resource Center (ITRC) to review 2022’s threat trends, the risks to businesses, and how employees and consumers can help protect their identity, credit and other personal data.
Watch Now

Cybersecurity Outlook 2022

Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You’ll hear from some of the cybersecurity industry’s top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.
Watch Now

Overcoming the Challenges of Credentialed Scanning

Tenable

Get the visibility you need to build an effective cyber exposure plan. You know authenticated or credentialed scanning provides more detail about your existing assets, along with the deepest possible understanding of the exposures in your environment. So why aren’t you taking more advantage of authenticated scanning? When we talk to security professionals who are hesitant to run credentialed scans, their story hasn't changed much in over 8 years. Two things stand out: Lack of trust. They're uncomfortable inputting credentials into a third-party, less-trusted source. Too much information. The tsunami of data generated by credentialed scanning is challenging to prioritize. If you're not taking full advantage of credentialed scanning, you need to watch this on-demand webinar to learn how Tenable and CyberArk integrate to: Provide details on what don’t you know about your environment, giving you a complete cyber exposure view.
Watch Now

How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now