Know What to Defend Against: Anatomy of a Network Attack

You can’t secure your IT infrastructure if you don’t know what’s attacking you and how. In this session, Alert Logic will share information on the latest network security trends, including the types of activity that the Alert Logic research team sees from our more than 2700 customers, and data on the origins and targets of attacks.
Watch Now

Spotlight

For industries with a full-time focus on fighting fraud - such as banking, insurance and healthcare, among others - intelligence is invaluable. Although direct financial losses from fraud can vary significantly from one industry to another or in different parts of the world, the annual cost of fraud is substantial.


OTHER ON-DEMAND WEBINARS

Security Metrics to Manage Change: Which Matter, Which Can Be Measured?

"Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?” What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like: - Which departments have access to which servers? - Who are the privileged users and when are they most active? - Where are the assets with vulnerabilities that can be reached from outside? - When are security defenses like firewalls likely to maxout? Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change."

Create agile confidence for better application security

"With many organizations transforming development efforts from traditional environments toward agile development, the need to redefine and establish security standards and testing methods is more important than ever. In this second one-hour webinar you'll learn how to: -Integrate security and compliance testing with agile development -Provide context for fast triage and remediation -Create policies for code management in integrated testing environments "

Keeping Wearable Technology Secure

From bodycams to fitness gadgets and life-saving medical devices, wearable technology is coming on strong, but are there risks involved? As standalone devices or a sub-category of the Internet of Things, wearable technology raises security and privacy concerns that need to be addressed sooner rather than later, as ESET Security Researcher Cameron Camp explains

Evolving Your Security Strategy to Overcome Business Challenges

Trustwave

"Organizations are having to cover more ground than ever when it comes to security. Yet businesses often lack the in-house skills and resources, so security leaders are turning to MSSPs to help bear the burden to ensure every area of risk is adequately attended to. Guest speaker, Forrester Research VP and Principal Analyst, Ed Ferrara, explains how MSS is changing the conversation for businesses to achieve security goals. Ed tackles your biggest security concerns such as: Overcoming the skills shortage Where to focus the budget - spending trends across industries The value of security - pitching it as an investment not a cost to business leader Improving business outcomes - leveraging MSSPs as a tactical arm to optimize IT security, efficiency and value"