How to Review a Vendor's Cybersecurity Program

How to Review a Vendor's Cybersecurity Program
With the increase in data breaches, cybersecurity continues to be a hot issue. It's critical that you understand your vendor's cybersecurity posture to protect your organization in the incident of a cybersecurity threat or attack. The time to prepare is now!

This session will discuss what to ask for from your vendors, how to review a vendor's cybersecurity, and what you can do as an organization to stay prepared.
Watch Now

Spotlight

76% of organizations experienced multiple account or credential compromises over the past 12 months, according to ESG’s 2023 research about the state of passwordless authentication in enterprise organizations. Recent prominent MFA-based breaches and friction in the end-user experience have reached the ears of IT and cybersecurit

OTHER ON-DEMAND WEBINARS

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life. The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills. This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

Approaching Cyber Security Vendor Selection in OT Environments

Nozomi Networks

Operational Technology (OT) and ICS environments present unique challenges for the selection of security solutions. Join ARC Advisory Group Vice President of Research, Larry O’Brien as he shares his recommendations for cyber security vendor selection in the ICS and OT worlds.
Watch Now

Kubernetes Security

Kubernetes security is becoming more challenging as the number of clusters running cloud-native applications continues to multiply rapidly. Challenges range from allowing in only legitimate traffic and enabling least-privileged communications between services to defend against attacks moving laterally between clusters, to validating how a workload is operating within the expected guardrails.
Watch Now

Endpoint Security Got You Down? No PowerShell? No Problem

Black Hills Information Security

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way! We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now

Spotlight

76% of organizations experienced multiple account or credential compromises over the past 12 months, according to ESG’s 2023 research about the state of passwordless authentication in enterprise organizations. Recent prominent MFA-based breaches and friction in the end-user experience have reached the ears of IT and cybersecurit

resources