Infosecurity 2016: Cyber Security in the Financial Sector

Ian covered key information security topics such as the notable recent breaches in the financial world and why the banks keep getting hacked; the principal threat actors and attack vectors; the main vulnerabilities to critical infrastructure; the enduring benefit of pentesting and cyber security is such an attractive career choice
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cybersecurity: Bridging the Gap Between Physical Security and IT / IoT

Dell EMC

On Monday, Dec. 11, as part of the SIA Webinar series, a webinar titled Cybersecurity: Bridging the Gap between Physical Security and IT/IoT covered best practices from edge to core hardening, bridging cyberprotection techniques, and technologies that help unify disparate technologies into a common cybersecurity framework. Speakers Vince Ricco (Axis Communications) and Ken Mills (Dell EMC) discussed how successful practitioners are hardening the physical security edge, enabling the authentication of devices systemwide and utilizing IT and IoT methodology to secure the enterprise.
Watch Now

Social media and email phishing: How to protect financial information from fraudsters

Channel Futures

Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now

Why IT Security and Project Mgmt. Training Will Be Key in 2017

RedVector

During this webcast, RedVector Senior Director of Product Management Bobby Person outlines the reasons why organizations must protect data and streamline projects, and provides training strategies to get started. Discover how your project managers, IT developers, software engineers and others can manage projects and resources to exceed expectations, mitigate network attacks and vulnerabilities, and earn important industry credentials and certifications using new project management training and IT infrastructure/security training.
Watch Now

Cyber Ranges – The Future of Cybersecurity Training

Cyberbit

Clearly, people have become the weakest link in the cybersecurity organization. The shortage of cybersecurity professionals in India is estimated by one million open positions. The existing workforce lacks the skills to match the growing volume and complexity of today’s attacks. How can we rethink our approach to training and upskilling our teams, and how can we certify new professionals faster so we can fill in the skill gap? Download the webinar and learn: How enterprises and governments use cyber ranges to run simulated attacks that prepare their SOC teams and red teams for the real world.
Watch Now