Healthcare's Need for Shifting Security Priorities from Prevention to Detection

The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly difficult to protect your digital assets and your data. You must shift security priorities from prevention to detection and remediation.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

OTHER ON-DEMAND WEBINARS

Understanding The Role Of Software Bill Of Materials In Cybersecurity Readiness

Cybersecurity issues are top of mind across the open source community, and beyond. In response to the ongoing threat of cyber attacks, Linux Foundation Research, in partnership with SPDX, OpenChain, and OpenSSF, has conducted the first in a series of research projects to understand the challenges and opportunities for securing software supply chains. This soon-to-be-published report, The State of Software Bill of Materials (SBOM) and Cybersecurity Readiness, will be released to coincide with this webinar.
Watch Now

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

Radiflow

Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process safety, securing IT assets was by far not their top priority. As industrial networks are becoming increasingly complex, geographically dispersed and interconnected, however, both impact and probability of numerous cybersecurity risks are growing, and the biggest challenge for CISOs nowadays is no longer how to persuade OT people to take notice, but how to evaluate a vast number of potential threats and to prioritize the actions needed to protect their networks.
Watch Now

Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

Incident Response Masterclass: Investigate a Rogue Insider with Varonis

Varonis

Join our IR team for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities. During this training session, our security analysts will execute a new attack scenario in our lab. An insider was paid to exfiltrate sensitive organizational data. To remain uncovered, he takes control on a service account. Using the service account, he scans company filers for documents with indicating keywords. Copies matching documents to his PC.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

resources