How to Take the Fire Drill out of Making Firewall Changes

This webcast examines the critical steps for an ideal security change workflow and offers ways to automate the entire firewall change management process. It includes a demonstration of the AlgoSec Security Management Suite, using a real-life firewall change request.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Leveraging Analytics for More Effective Security Performance

BitSight

More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off — and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to your organization? Security ratings and the analytics they provide give businesses a unique insight into their organization's security performance and posture in relation to their peer group.
Watch Now

Accelerating Digitalization: Cyber Security

This second of TOC Digital’s ‘Accelerating Digitalization’ webinar series in association with maritime street, took place on 15th July 2020. Providing insights from an expert panel including Gadi Bensmonshe, CIO of Israel Port Company, Dr. Carmit Yadin, CEO & Co-Founder of Arcusteam, Roi Mit, Chief Marketing Officer of Regulus Cyber and Pascal Ollivier, President of maritime street, viewers learned the various implications to consider when formulating a comprehensive strategy to reduce immediate cyber threats, and what the overall picture looked like for the wider industry.
Watch Now

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need

Sentryo

You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now

Stage 3 – Management: The third layer of your cyber-defense-in-depth strategy

When it comes to larger or more complex organizations, managing cyber security risks requires a more intensive approach than implementing basic security protection. Embedding risk-based security controls, managing the security of supply chains, and carrying out regular audits are some of the many measures an organization may need to take to manage and reduce risk.
Watch Now