How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Spotlight

In 2021, Ponemon conducted a survey* in which 597 health delivery organizations participated. Of these, 42% said that, within the last few years, they had faced at least two ransomware attacks. This number is only growing as attack surfaces are fast expanding. While new ransomware variants spring up frequently, the tactics and t

OTHER ON-DEMAND WEBINARS

Active Directory Best Practices to Frustrate Attackers

Black Hills Information Security

Active Directory out of the box defaults aren’t enough to keep your network safe. Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard. But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment. Here are some baseline things you can do to make your Active Directory environment frustrating for attackers. Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now

Top 5 Cybersecurity Misconceptions

Alpine Security

Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now

Threat Hunting Reimagined

Devo

Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and prevent the analyst from doing what they do best - hunt threats. Join our webinar and see firsthand how threat hunting teams can realize their full potential. With Devo, threat hunters can: Analyze real-time streaming and historical data at petabyte scale.
Watch Now

Are you Ready to Demystify the Dark Web with IBM IRIS?

IBM

Dark web forums and marketplaces can be treasure troves of data on threat actor activities, motivations, and capabilities. Often organizations desiring to obtain this valuable information attempt to conduct their own dark web research. However, what they usually learn too late is that setting up effective, efficient dark web access can be costly, difficult, and dangerous to the organization. This webinar covers the challenges setting up a dark web collection apparatus, and why for most organizations using an independent provider makes more sense.
Watch Now

Spotlight

In 2021, Ponemon conducted a survey* in which 597 health delivery organizations participated. Of these, 42% said that, within the last few years, they had faced at least two ransomware attacks. This number is only growing as attack surfaces are fast expanding. While new ransomware variants spring up frequently, the tactics and t

resources