DRIVING IT, PRIVACY - CYBERSECURITY AND PERSONAL DATA PROTECTION - ON DEMAND WEBINAR

Initiatives to improve network security collides sometimes with the citizen's right to privacy and the protection of private data. An important point is that public policies for network security must respect our fundamental rights.
Hear why Jesper Lund believes that restrictions on the use of techniques of privacy and encryption does not solve problems with network security - on the contrary.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Kubernetes Security

Kubernetes security is becoming more challenging as the number of clusters running cloud-native applications continues to multiply rapidly. Challenges range from allowing in only legitimate traffic and enabling least-privileged communications between services to defend against attacks moving laterally between clusters, to validating how a workload is operating within the expected guardrails.
Watch Now

Anatomy of a Ransomware Attack

Organizations are destined to pay a ransom if they can’t recover encrypted files quickly – not to mention experience significant revenue and brand damage. Let Insight and Rubrik provide visibility into the scope of damage, fast restore from uncompromised backups of important files for business continuity, and alerts that uncover unusual behavior from the ransomware infection.
Watch Now

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

Zimperium

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

Industry 4.0 and the ICS & OT Cybersecurity Challenges with Digital Transformation

Targeted industrial cyberattacks are increasing at an alarming rate, especially within the manufacturing sector, costing companies an average of $2M per breach, this doesn’t even consider brand damage, downtime, penalties, or potential lawsuits. On average hackers are moving silently in networks 6 months before they are found. Sound scary? Well yeah, it is! Don’t worry we’re here to help.
Watch Now