Is GDPR Working? Lessons from Data & the Field

BitSight

Find out what data tells us about the effectiveness of GDPR. After years of debate over whether to impose new cybersecurity regulations on companies, the General Data Protection Regulation (GDPR) went into effect in Europe in May 2018. Already we’re seeing data breach victims ordered to pay fines under the new rules, and cookie disclosure notices are popping up on more websites than ever.
Watch Now

Spotlight

Account takeover attacks provide cyber criminals with authorized access to legitimate user accounts. Take back control of your Web apps. Download this playbook and learn five solution requirements for effective account takeover protection.

OTHER ON-DEMAND WEBINARS

Cybersecurity knowledge gap not uniform across sectors

Hrdive

Workers in finance know more than workers in other industries about cubersecurity, according to a report from Proofpoint. After analyzing more than 100 million answers to cybersecurity questions from employees in 16 industries, Proofpoint found that finance workers answered 80% of questions correctly. Transportation and education sector workers had the least knowledge among the various sectors, answering 24% of questions correctly on average, Proofpoint determined.
Watch Now

Cloud Security Strategies for Today’s Enterprises

The typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual providers. In this webinar, experts discuss the specific tools and best practices to manage security in the cloud environment. You’ll learn technologies and strategies to safely move data into the cloud, enforce policies across different platforms, and monitor data in the cloud. You’ll walk away with recommendations on ways to securely manage cloud environments, even across multiple vendors.
Watch Now

Don’t Diverge, Converge - Build a Zero Trust Strategy with FortiGate NGFW

Hybrid networks enable organizations to implement critical new business applications and services, but they also increase the attack surface.
Watch Now

Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now

Spotlight

Account takeover attacks provide cyber criminals with authorized access to legitimate user accounts. Take back control of your Web apps. Download this playbook and learn five solution requirements for effective account takeover protection.

resources