Information Security Exposures: Creating and Sustaining a Culture of Security

MGI Worldwide members from across the globe took part in our latest webinar on July 24th, hosted by Founding Partner, Producer and Vice-President Stephen Vono of McGowanPRO. Titled 'Information Security Exposures: Creating and Sustaining a Culture of Security’ the webinar was geared towards all levels of staff, with the aim of helping everyone gain a better understanding of information security threats, their exposures, and important steps that need to be taken to address this issue. The webinar focused on the importance of establishing a culture of client information security for all firms. Stephen also discussed the risks relating to information exposure, as well as the policies and procedures needed to prevent this for information security best practice.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack

Cybersecurity Ventures

When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now

Zero Loss Strategy: A business-critical approach to fighting ransomware

You’ve seen the headlines – organizations with their data held hostage and ransom payments to perpetrators to restore it. Time is of the essence during a ransomware attack. Is your organization prepared? Do all your teams know their roles and responsibilities? Do they have the authority to make immediate decisions?
Watch Now

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now