Cybersecurity Ratings Part 3: The Third Way

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

OTHER ON-DEMAND WEBINARS

Exciting Updates for Threat Response Cloud and TRAP 5.8

As security products move more into the cloud, Proofpoint continues to strengthen our Threat Response Auto-Pull solution. Join us for this customer session to learn about new features available to you, including our new audit-logging, internal incident response, and enhanced visualizations in Threat Response Cloud. We also have exciting new updates for TRAP 5.8 on-prem.
Watch Now

Another Bucket Bites the Dust... Simplifying AWS Cybersecurity

Alert Logic

With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security. Securing your AWS workload can mean many different things, ranging from locking down your environment via the AWS best practices list, to completely outsourcing the security management and responsibility to another company. While every company’s security journey is different, everyone can agree that the need to monitor and improve security posture is becoming increasingly important.
Watch Now

Bridging the gap between on-prem and AWS security

cisco

As more organizations use a combination of their on-premises network and Amazon Web Services (AWS) to deliver services and applications, they are struggling to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy these requirements in an efficient, cloud-native way to ensure security is effective.
Watch Now

3-Minute Video: Overcoming the Challenges of an Unplanned Distributed Workforce

When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique structure was built for these challenging en
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

resources