Eliminate the IOT Security Blind Spot

Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses: Where current architecture is falling short, What next-generation architecture should look like, How to address vulnerabilities found in IoT devices/the unmanaged endpoint.
Watch Now


Enterprises are increasingly adopting Linux as a secure, reliable, and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions.


The Upcoming SEC and FINRA Cybersecurity Sweeps. Is Your Firm Ready?

Because of all of the sensitive financial information that RIA’s, Broker Dealers and Banks keep regarding their clients, internet security has become a major concern for the wealth management industry. As, hacking techniques are growing more sophisticated, it is hard to tell who could be observing your connection and Internet activity. Due to this cyber-threat the SEC and FINRA will be conducting cybersecurity sweeps of the wealth management industry to make sure you are up to date and taking the latest precautions to protect your clients.Why Hackers Target RIAs and Financial Firms Bank account numbers and social security numbers are not the only thing hackers are looking to steal. Many hackers and rogue traders are hijacking trading accounts from financial firms and making unauthorized trades, as well as stealing funds.How the SEC and FINRA Cybersecurity Sweeps Will Work The SEC and FINRA are aware of these potential security threats and want the industry to get prepared. They have announced that this year they are planning random sweeps to test the defenses of various firms. If a firm’s cybersecurity is not up to the job, the SEC and FINRA could levy large fines as punishment for the oversight.

"How Modern Automation Can Improve the Impact of Your Security Team"


"Advanced Persistent Threats (APTs) are in every network. They rely on you being overwhelmed by alerts and unable to follow up and respond to attacks - it typically takes days, weeks, sometimes months to resolve a cyberattack (the Ponemon Institute found it takes 32 days, on average, to close out a cyberattack). This is time you don't have. Attend this webinar to see how to change this paradigm and mature your incident response so you can quickly uncover, contain and remediate attacks in your network. See how other companies have used modern automation technologies to take their Incident Response to the next level: · Investigating everything – no more prioritization or alerts going unhandled · Quickly mitigating threats – including large scale cyber events – to close the window of opportunity for attackers · Applying IR best practices – through codified logic and intelligent decision-making algorithms that take the complexity out of IR"

In the Spotlight: Successfully Adopting an ‘Assume Breach’ Mindset

Join Damballa University for a rebroadcast of our 5-part series of content, conversation, and insights to get your detection and response program on the right track. Hosted by Michael Santarcangelo of Security Catalyst, this is a series focused on providing you with information and the strategy to successfully navigate and bridge the gap between the “assume breach” mindset and actions necessary to demonstrate success.Series Breakdown Part 1: Overcome prevention bias to get ahead of the threat, featuring Mark Weatherford (Chertoff Group), Part 2: Align your “assume breach” mindset with actions that get results, featuring Ron Wilson (Damballa VP Customer Success).

Disaster Recovery: What to Expect When You Declare a Disaster

oin Catherine Roy, Sr. Manager of the HOSTING Project Management Organization and Brian Frank, HOSTING Cloud Services Manager, for a discussion on best practices in declaring a disaster and implementing your disaster recovery solution. Having implemented over 300+ disaster recovery solutions, the team will draw upon real-world experience and give valuable, practical advice for handling your DR solutions in all cloud environments -- large, small, simple and complex. The following topics will be covered: •Business Continuity •Prepping for Disaster •Disaster Recovery Testing •What happens when you declare a Disaster