Insider Knowledge on the Battle to Stop Advanced Cyber Attacks

Hear first hand from a FireEye customer and their battle against advanced cyber attacks.See how legacy security technologies have been rendered ineffective.Review the five stages of an advanced cyber attack.
Watch Now


This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the U.S. and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users


The need of Cybersecurity in the present era


Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy. The Global Risks 2015 report, published in January by the World Economic Forum (WEF), included this rather stark warning: “90 percent of companies worldwide recognize they are insufficiently prepared to protect themselves against [cyber attacks].” Watch this webinar to understand the basics of Cyber-Security, why it make sense and the reason why organizations now look for skilled & certified Cyber-Security professionals to protect them against cyber-attacks.

Preparing for a Security Breach


"How to keep your head (and your job) when the worse case scenario happens. Due to the increasing frequency of security breaches, defining an action plan is critical for every security practitioner. Getting breached doesn’t determine whether or not you’ve got a good security program in place – but how you respond to one does. Join security expert Conrad Constantine of AlienVault, for an in-depth discussion on things you and your team should do today to prepare for information security breaches. You’ll get practical, lessons learned advice on: The inevitability of security breaches Preparing to survive security breaches Threat identification and containment Handling the aftermath so it’s not worse than the breach itself"

Lessons Learned From the Hack of the DNC and Other Incidents


The cause and consequence of several pivotal hacking incidents. What attack tradecraft and techniques will trickle down to the consumer attack community. What you can do to prevent incidents from causing major disruptions in your organization. As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.



The GDPR is Here: How to Stay Resilient to Breaches and Auditors. In this session of our Webinar Wednesday series, Dataguise discusses the General Data Protection Regulation (GDPR) and how organizations can prevent breaches and audits. The presenter explores technology to help enterprise organizations protect personal data now that GDPR is here.