Insider Threats - Safeguarding Financial Enterprise Information Assets

Societe Generale being a prime example - in a business environment, 32% of all fraud and theft is perpetrated by trusted employees, enforcing and monitoring employee access to information assets is critical. In fact, it is not only critical, it is also a legal requirement in a growing number of government regulations and industry mandates.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

How to Secure Your Applications Against API Attacks

Application programming interfaces (APIs) are the basic building blocks to enabling business applications and software to communicate and share data. Therefore, cyber-attacks targeting APIs can be a major headache to businesses, potentially leading to large-scale data breaches as well as causing massive disruption. Yet, API security has never been more broken, with security teams unprepared for surging levels of attacks targeting these software intermediaries. In this webinar, a panel of experts will review the state of API cybersecurity and provide insights into how to protect these interfaces from an increasingly high volume of attacks. Join this session to learn:
Watch Now

Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic

Alert Logic

As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises. In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection.
Watch Now

Bringing New Meaning to Extended Detection and Response

For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).
Watch Now

Maximizing Network Security with Microsegmentation to Minimize the Risk From Any Attacker

Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.
Watch Now