How Security Culture Reduces the Likelihood of Being Breached

In this webinar I will discuss what security culture is, where it belongs in the organisation, and how good security culture can reduce the likelihood of being breached. I will point to research on culture, human behaviours, and how to motivate people to do the right thing.
Watch Now

Spotlight

It’s no secret that digital technology has transformed the way we do business. It’s also no secret that many more changes lie ahead. Almost every year, a new digital technology arrives that disrupts the status quo and opens new operational vistas for enterprises. From the cloud, mobile and social innovations that have already changed our world, new advances in virtual reality (VR), blockchain, AI and quantum computing will arise and continue to reshape how we work and live.


OTHER ON-DEMAND WEBINARS

MOBILE SECURITY IN AN APP-CENTRIC FEDERAL ENVIRONMENT

Apperian

Mobile applications are powering federal agencies to increase productivity. However, mobile apps can cause serious security issues like malware attacks, and corporate and PII data leaks. So how can you empower workers through mobility, and create a highly secure environment with real-time visibility into all your enterprise applications? During this webinar, Alex Deli, Director of Federal Practice at Apperian, discusses: Setting up private app store do’s and don’ts Creating a mobile application strategy Overcoming MDM interoperability issues Mobile application lifecycle, moving beyond device management Meeting federal standards for mobile applications Download your copy of the recording today!

Enhancing Your Security Infrastructure with Infoblox Threat Intelligence

Infoblox

If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that means, you end up with gaps in your view of the threat intelligence and your defense across your infrastructure. Join us for an upcoming webinar and learn how Infoblox Threat Intelligence Data Exchange (TIDE) can help you: Get what you need: Easily create threat intelligence data feeds to combine Infoblox’s high-quality data with the data you already have.

Can We Fight Back and Even Win: A Case Study of Success

As we bring the day to a close and have learned of the sophistication of our adversaries, the question remains: will they always have the upper hand? In this session that sets the stage for the closing Investigations and Law Enforcement panel discussion, a leading industry expert in the field of cyber counter intelligence and investigations will walk us through a study of how to bring all the moving pieces together for a successful investigation and prosecution into data breach and fraud.

"Automation in Network Security Management"

Join us for this webinar to learn how the right level of automation can alleviate your workload, improve your security, and streamline the management process in your security deployments, and how Palo Alto Networks network security management solution offers you that critical level of automation

Spotlight

It’s no secret that digital technology has transformed the way we do business. It’s also no secret that many more changes lie ahead. Almost every year, a new digital technology arrives that disrupts the status quo and opens new operational vistas for enterprises. From the cloud, mobile and social innovations that have already changed our world, new advances in virtual reality (VR), blockchain, AI and quantum computing will arise and continue to reshape how we work and live.

resources