Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Spotlight

"IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the entire business environment that come from many sources-applications, systems, social media, etc.

In addition, mobile employees and customers are changing the face of business, and redefining the challenge of delivering secure applications quickly to the changing user population. These factors cause a dramatic shift in the role of security, and how user identities should be managed. The old way of managing users and access won't suffice in the new world order."

OTHER ON-DEMAND WEBINARS

5 steps every charity should take to improve their cyber security

NCSC

On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their organisation. In this session, we’ll look at the simple, free or low cost steps every charity should be taking to protect themselves online.
Watch Now

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now

Demystifying AI for Cyber Security

Eurofins Scientific

From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI-powered technology offers a proven approach to combat the threats that could already be inside the network – before they escalate into a crisis. Join Eurofins’s VP of Cyber Security, Sean Walls, and Darktrace’s Director of Enterprise Cyber Security, David Masson, to discuss how advances in autonomous AI are shaping the way security teams visualize, detect, and respond to emerging threats – all in real time.
Watch Now

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019

Mithi

In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Watch Now

Spotlight

"IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the entire business environment that come from many sources-applications, systems, social media, etc.

In addition, mobile employees and customers are changing the face of business, and redefining the challenge of delivering secure applications quickly to the changing user population. These factors cause a dramatic shift in the role of security, and how user identities should be managed. The old way of managing users and access won't suffice in the new world order."

resources