HOW TO KEEP FAMILIES CYBER SAFE

In our on-demand webinar, Protecting Your Family’s Online Reputation: A Conversation About Child & Family Social Media Habits, we explore the results of surveys on child and family social media habits, just in time for National Cyber Security Awareness month. Our children are digital natives who grow up with the internet, computers and smartphones. Sixty-eight percent have and manage their own social media profiles, according to the “Child & Family Social Media Habits Survey,” from the Identity Theft Resource Center and CyberScout. This early exposure brings convenience—and also puts them at a greater risk for phishing attacks, cyber bullying, identity theft and other threats.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Building Blocks for Your IT Security Program

AT&T Cybersecurity

Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.
Watch Now

Live Hack: Definitive Guide to Endpoint Security

When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are its endpoints. Your endpoints represent fertile ground for attacks because their users, applications, and services often have elevated privileges that give cyber criminals an easy on-ramp to the inner workings and data within your organization.
Watch Now

[RSA Fireside Chat] Stop Ransomware Attacks with “Assume Compromise” Mentality

Cybercriminals are always on the lookout for opportunities to profit from security weaknesses. Meanwhile, the COVID pandemic lead accelerated cloud transformation has rendered many of the assumptions of legacy security approaches obsolete. Enterprises are realizing that modern cyber-attacks won’t be stopped by a purely preventive strategy. In fact, it’s almost a given that with sufficient time, motivation, and resources an attacker will always find a point of entry.
Watch Now

Becoming a Threat Hunter in Your Enterprise

ExtraHop

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now