How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Spotlight

It takes a new mindset to manage cloud infrastructure. And to truly reap the benefits from the cloud means that leaders must rethink their approach to infrastructure security. The degree to which one gives up control of IT infrastructure varies based on the adoption of private, public or hybrid platforms. But to ensure cloud infrastructure security, organizations cannot apply their traditional set of IT tools and techniques.


OTHER ON-DEMAND WEBINARS

10 Things I Learned by Phishing My Company

Duo Security

Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your data and users?Phishing simulation tools are a powerful way to see how many and which employees are prone to fall for phishing attacks. With this information in hand, you can determine how to train those who are susceptible to avoid these attempts, and provide the tools to protect against them.
Watch Now

(ISC)² SecureMinneapolis2015

(ISC)2 offers a comprehensive range of quality, high-level educational events. Professionals can earn CPEs at (ISC)2 e-Symposiums and (ISC)2 Security Leadership Events. (ISC)2 Secure Events take place throughout the year and in cities across the globe. Upcoming Secure Events focus on managing risk in the ever-changing threat landscape, advancing the cybersecurity workforce, and other pressing topics of interest to the Information Security community.
Watch Now

How to Excite your staff about Social Engineering & Awareness

Proofpoint

Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
Watch Now

Application Security in the Age of Open Source

IBM

Whether you’re developing applications for internal use or for your customers, keeping them secure is no easy feat. After all, today’s applications are a healthy mix of open source and custom code. Identifying and resolving security vulnerabilities in both requires the right tools and know-how.Hear IBM and Black Duck present an educational webinar on what it takes to keep your apps safe in the age of open source.
Watch Now

Spotlight

It takes a new mindset to manage cloud infrastructure. And to truly reap the benefits from the cloud means that leaders must rethink their approach to infrastructure security. The degree to which one gives up control of IT infrastructure varies based on the adoption of private, public or hybrid platforms. But to ensure cloud infrastructure security, organizations cannot apply their traditional set of IT tools and techniques.

resources