Harness the Power of Digital Notetaking: A Day in the Life of OneNote

"Napkins, notepads, and multiple devices – keeping notes is a mess. Research suggests that the average employee spends roughly 76 hours a year looking for misplaced notes, items or files (Brother International Organization, 2010).

Imagine what you could do if you could capture all your ideas and information in one versatile digital notebook. Join us for this webcast to learn how you can harness the power of digital notetaking. Start by collecting and organizing all kinds of information.

In this webcast, you’ll learn now you can get more hours out of the day by:
•Collecting information from multiple sources into one handy notebook. For example, grab a news clip off the web, record an inspired idea on the go and combine handwriting, spreadsheets, diagrams, even email.
•Accessing your information from nearly any device, any time. Use familiar Microsoft Office tools to access your notebook. "
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Emergence of Data Security Governance: A Roadmap to Business Success

Digital transformation and rapid cloud adoption massively impact security postures for organizations of all sizes. The new world of zero perimeters and separation of data storage, compute, and consumption requires a new, holistic approach to access security and provisioning. In their latest Hype Cycle for Data Security 2022, Gartner expands on a new concept—Data Security Governance. Specifically, Data Security Platforms as a modern approach to comprehensive data security and access controls in a world demanding more, faster access to data.
Watch Now

How to Leverage Hacking Competitions as an Educational and Recruitment Tool

HealthcareInfoSecurity

One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and there are few occasions in which the various security specialists can enjoy working as a team. One activity that can help build a team while improving the security skills of the people involved is participating in Capture the Flag (CTF) hacking competitions. In 2003 at the University of California at Santa Barbara, one of the world's largest attack-defense CTF competitions began and has grown year-after-year, pushing the limits of the players and providing opportunities for better learning. In addition, hacking competitions are a great opportunity for recruiting new talent: CTF participants are highly skilled, well-motivated, and hard-working, which are great traits for a future employee.
Watch Now

Five Phases of Ethical Hacking

GreyCampus

GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking & Career Opportunities. Phases of Ethical Hacking. Phase 1 – Reconnaissance.
Watch Now

Securing Organizations from Remote Desktop Protocol Exploits

HealthcareInfoSecurity

Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote Desktop Protocol, these exposures often occur outside of organizations' known IP space, making them difficult to detect and remediate. This webinar will discuss how easily these misconfigurations can occur, how organizations can discover them, even outside of normal IP space, and how they can establish playbooks to remediate and reduce occurrence over time.
Watch Now