How To Create a Successful Cyber-Security Policy

As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security policies: a series of rules that define what end users may or may not do with their technology. In this on-demand webinar, DP Solutions’ Senior IT Risk Advisor Ben Schmerler discusses how to develop a solid and reasonable policy for your organization. From this webinar, you will learn: What information should be covered in your policies. Special considerations such as mobile devices, social media, compliance or legal concerns. How to properly document your policies. How to determine if your employees are following the policies. Technology options to enforce the policies.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

OTHER ON-DEMAND WEBINARS

How to Prioritize and Protect Against Relevant Threats: Context is the Key

ThreatConnect

Joint webinar featuring ThreatConnect and FireEye iSight Intelligence: “How to Prioritize and Protect Against Relevant Threats: Context is Key”. The webinar covers how to prioritize your team’s response and put your intelligence to use.
Watch Now

5 steps every charity should take to improve their cyber security

NCSC

On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their organisation. In this session, we’ll look at the simple, free or low cost steps every charity should be taking to protect themselves online.
Watch Now

ON-DEMAND WEBINAR Best Practices for Implementing a Cyber-Physical Convergence Strategy

Security leaders need comprehensive strategies that take both physical security and cybersecurity into account. This session covers: How to develop a holistic security strategy How to implement a framework to align both security functions How to bridge the gap between cyber and physical security operations How to leverage data-d
Watch Now

Cyber Ranges – The Future of Cybersecurity Training

Cyberbit

Clearly, people have become the weakest link in the cybersecurity organization. The shortage of cybersecurity professionals in India is estimated by one million open positions. The existing workforce lacks the skills to match the growing volume and complexity of today’s attacks. How can we rethink our approach to training and upskilling our teams, and how can we certify new professionals faster so we can fill in the skill gap? Download the webinar and learn: How enterprises and governments use cyber ranges to run simulated attacks that prepare their SOC teams and red teams for the real world.
Watch Now

Spotlight

Organizations are losing IT and security control Once upon a time, IT and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud

resources