How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now

Spotlight

We know that cyber security is complex and open to continuous threat. iOCO’s status as a WithSecure Gold Partner in Africa gives you all you need to automatically predict, prevent, detect, and respond to any risk and threat 24-7-365.

OTHER ON-DEMAND WEBINARS

Cyberattack Prevention for the Water & Wastewater Industry

America’s Water Infrastructure Act (AWIA) mandates (drinking) water systems serving more than 3,300 people to improve cybersecurity measures no later than six months after certifying the completion of a risk and resilience assessment. It is important to understand the various dimensions of the challenges in cyber securing water and wastewater treatment plants before we establish a roadmap to manage cyber threats, risks, and breaches.
Watch Now

Stopping Email-Borne Threats Before They Spread

Mimecast

Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the same diligence as your inbound email? What about the emails being sent out to your partners, suppliers, and customers? Attend this webinar to take a step inside your organization’s entire email traffic to learn about: The latest techniques that attackers are using to target your users. How attacks are spread both internally and externally. Advanced security and automation to defend your organization from compromised users and internal threats.
Watch Now

3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Infocyte

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Spotlight

We know that cyber security is complex and open to continuous threat. iOCO’s status as a WithSecure Gold Partner in Africa gives you all you need to automatically predict, prevent, detect, and respond to any risk and threat 24-7-365.

resources