Identity Security on the Rails: Simple Solutions to Disrupt Identity-Based Attacks

Identity Security on the Rails: Simple Solutions
In today’s distributed work environment, Identity is the new perimeter, so it should come as no surprise that attackers consider identities both on-premises and in the cloud as High-Value Targets. With a valid identity, attackers can move laterally, escalate privileges, identify critical servers, and execute damaging attacks. Fortunately, Identity Security addresses identity risks and detects identity-based attacks.
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

OTHER ON-DEMAND WEBINARS

Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now

The Path Forward for Cybersecurity's AI: Not All AI Are Created Equal

Bank information security

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.
Watch Now

How Malware Affects Your Security Rating & What to Do About It

BitSight

Learn how botnet infections can impact your security posture. Security incidents such as malware infections can cause damage and disruption that propagates far beyond the organization, affecting its reputation, brand value and customer loyalty. Security ratings are impacted by these, giving an independent view into potential areas where security resources could be focused. In this webinar, BitSight's Tiago Pereira explains how and why botnet infections are a key metric of the effectiveness of your security posture, their impact on external security ratings and how to effectively deal with infections affecting your organization's rating.
Watch Now

Understanding privacy regulations and compliance

Baker Tilly

Data is among an organization’s most valuable assets. Its management and protection should be viewed as a mission-critical stewardship rather than mere compliance. Larger and more costly cybersecurity incidents coincide with annually increasing regulatory and liability pressures. Looming U.S. privacy legislation on the horizon coupled with the General Data Protection Regulation’s impacts (Google recently received a $57 million fine), intensifies pressure on organizations to understand their legal compliance obligations and to safeguard private information.
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

resources