Forrester-Led Webinar: Connecting the Relationship Between Threat Intelligence and Adversary

ThreatConnect

Join Forrester Analyst Rick Holland and ThreatConnect Chief Intelligence Officer Rich Barger for a webinar on understanding your adversary and the importance of proper threat intelligence analysis to proactively defend your organization
Watch Now

Spotlight

"Security professionals seeking to secure their networks against constant cyber attacks are challenged by the flood of options. In particular, they can be daunted by the many dimensions of implementing Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS). The author will first summarize some of the most effective ways to identify and implement an IDS/IPS for your organization, and then will move into the common misconfigurations identified across the various solutions available and how the misconfigurations can be actively exploited by a malicious actor. The author will first summarize the setups and configurations that companies commonly use for their IDS and IPS solutions, then will move into the many ways that these systems can be bypassed and evaded. With each technique and tool covered, the author will highlight the common IDS/IPS misconfiguration that the tool takes advantage. Lastly, the author will make recommendations for more secure IDS/IPS that aim to increase not only the security of the system itself, but the company’s security posture as a whole."

OTHER ON-DEMAND WEBINARS

2018 Threat Report and Top Malware

Webroot

If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Join this Channel Futures webinar to learn more about the discoveries and analysis of threat activity throughout 2017, the top malware of 2017 and how to be better equipped to overcome modern cybercrime in 2018.
Watch Now

On-demand Webinar: IoT and Cybersecurity

Use your next 30 minutes to update you on IoT and Cybersecurity. During this on-demand webinar we are going to talk about Cyber security threats and challenges towards global or regional regulatory alignment? Standards and certifications Nemko Cyber Security Assurance services The schemes Key factors for the manufacturer to cover Common Criteria
Watch Now

The Business Impact of Cyber Risk

InfoSec Institute

KPMG reports 68% of CEOs believe a cyberattack is a matter of when — not if. How is your organization preparing to mitigate cyber risk in the new year? Join David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations professional for strategies to help you: Discuss cybersecurity at the board level.
Watch Now

Financing Security: How M&As and the Markets Are Shaping the Security Industry

SIA

Attend the unique SIA webinar “Financing Security: How M&As and the Markets Are Shaping the Security Industry” to learn more about the impact of the 2018 deals that brought together Amazon and Ring, ADT and Red Hawk, Motorola and Avigilon, Securitas and Kratos, and many others. In addition, this webinar will examine the debt capital markets, equity capital markets, emerging market trends and other financial components of the security industry, while providing a look ahead to the rest of 2019.a
Watch Now

Spotlight

"Security professionals seeking to secure their networks against constant cyber attacks are challenged by the flood of options. In particular, they can be daunted by the many dimensions of implementing Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS). The author will first summarize some of the most effective ways to identify and implement an IDS/IPS for your organization, and then will move into the common misconfigurations identified across the various solutions available and how the misconfigurations can be actively exploited by a malicious actor. The author will first summarize the setups and configurations that companies commonly use for their IDS and IPS solutions, then will move into the many ways that these systems can be bypassed and evaded. With each technique and tool covered, the author will highlight the common IDS/IPS misconfiguration that the tool takes advantage. Lastly, the author will make recommendations for more secure IDS/IPS that aim to increase not only the security of the system itself, but the company’s security posture as a whole."

resources