Dyn DDoS Attack - What We Know & Why It Matters


Dyn DDoS Attack - What We Know & Why It Matters.On October 21st, a distributed denial of service (DDoS) attack on Dyn DNS took out a large number of high-profile websites, such as Twitter, Reddit, Netflix, Spotify, Paypal and others, offline. Join this panel discussion to find out what happened, who was affected and the likelihood of repeat attacks of this magnitude in the future.
Watch Now


The Financial Services industry has long been a pioneer in developing risk management practices. As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors.


The Virtual Backdoor: Protecting Your Digital Supply Chain

"Securing the digital supply chain has risen up the corporate agenda in light of increased reliance on outsourcing, largely influenced by cloud computing, mobile technology and a change in cybercriminal focus and behaviour. Online criminals are increasingly looking to exploit smaller supplier organisations as opposed to the large corporate businesses sharing the data. These small suppliers often comprise of less than 250 employees, have a very small security staff (if any), immature security monitoring, tools or testing capability, and divergent priorities (namely trying to grow and stay in business) to protecting a larger organisation's data."

Evolving Your Security Strategy to Overcome Business Challenges


"Organizations are having to cover more ground than ever when it comes to security. Yet businesses often lack the in-house skills and resources, so security leaders are turning to MSSPs to help bear the burden to ensure every area of risk is adequately attended to. Guest speaker, Forrester Research VP and Principal Analyst, Ed Ferrara, explains how MSS is changing the conversation for businesses to achieve security goals. Ed tackles your biggest security concerns such as: Overcoming the skills shortage Where to focus the budget - spending trends across industries The value of security - pitching it as an investment not a cost to business leader Improving business outcomes - leveraging MSSPs as a tactical arm to optimize IT security, efficiency and value"

Cybersecurity: Prime and Subcontractor Responsibilities

Cyber security On-Demand Webinar, cyber-attack On-Demand Webinar, malware On-Demand Webinar

It’s no longer a question of if your cybersecurity will be compromised, but when. Government contractors—both prime contractors and their subcontractors—must understand the federal cybersecurity landscape to ensure compliance with its numerous (and sometimes confusing) requirements.

The smallest device may be the biggest risk to your company! by Trend Micro EMEA

"Come join the Global leader in content security for Small business and learn how to: •Protect email, web, file sharing, and more •Filter URLs by blocking access to inappropriate websites, increasing employee productivity •Prevent data loss via email messages and USB drives •Block spam and safeguards against phishing as well as social engineering attacks •Protect Windows, Mac, and mobile devices "