The numbers are alarming - 91% of hacks begin with an email attack and 23% of phishing emails are opened. Employees, the humans, have always been the weakest link in an IT security strategy. Attackers know this, and prey on them with spear-phishing and social engineering attacks. Why your existing IT security strategy is failing. How to strengthen security with better employee threat awareness.
"With a recent survey reminding us that the most critical priorities of SMB owners today are top line revenue growth and increase in bottom line profitability, with an overwhelming desire for trusted IT/Security partners to manage the entirety of security and IT for them, it makes perfect sense to demand more of today’s UTM.
In this webcast we will explore:
•The results of the recent SMB owner survey
•Ways the simplicity of the traditional UTM can be extended more broadly
•Key questions to ask your trusted IT/Security provider"
"So, you've got an alarm - or 400 alarms maybe, now what? Security incident investigations can take many paths leading to incident response, a false positive or something else entirely. Join this webcast to see security experts from AlienVault and Castra Consulting work on real security events (well, real at one point), and perform real investigations, using AlienVault USM as the investigative tool. Process or art form? Yes.
- Tips for assessing context for the investigation
- How to spend your time doing the right things
- How to classify alarms, rule out false positives and improve tuning
- The value of documentation for effective incident response and security controls
- How to speed security incident investigation and response with AlienVault USM
Joe, Tony and Grant, collectively known as ""JTaG"", have been working with packets one way or another for a combined 50 years. During their tenure at AT&T, they managed IDS for some of the world's largest companies and have used every IDS available from NetRanger to Suricata. They also stood up SIEMs capable of processing billions of events per day in their ""Threat Management"" SOC environment. These days, they use their powers for good, helping customers of all sizes understand the ever-changing security landscape."
"Join Netskope to learn how to measure cloud risk and apply policy enforcement in your organisation. Netskope provide surgical visibility and control of all sanctioned and unsanctioned cloud apps, ensuring that you have 360 coverage and can reduce the risk of moving your business to the cloud."