Alert Logic
The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats, you need to leverage software plus services to augment your security team and capabilities.
Watch Now
The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.
Watch Now
MediaPRO
Developing and maintaining a security-aware culture in an organization has become vital in the defense against modern cyberthreats. But such a culture cannot be expected to develop overnight. Building such a culture is a journey, not a miracle, with many pitfalls along the way. That’s why we’re here to help. Watch our on-webinar Harden the Human Firewall by Building Awareness, Behavior, and Culture, with MediaPRO Chief Learning Officer Tom Pendergast guest speaker Forrester analyst Jinan Budge to learn how to instill a culture of security through an engaging, meaningful, and even entertaining security awareness program.
Watch Now
Cylance
The BlackBerry Cylance 2019 Threat Report Highlights webinar is an opportunity to examine our conclusions with the researchers and analysts who authored the report. Join us for an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts will offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
Watch Now