Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations

Data security is moving to the top of the executive agenda, with companies paying more attention to what data they have, and how to protect it.  Organizations are rolling out more access controls and upgrading their monitoring and assessment capabilities to best manage new regulations on the horizon. California’s passing of the California Consumer Privacy Act of 2018 (CaCPA) on June 28 and adoption of a set of amendments to the law in September has proven to be a strong catalyst for a new focus on data security.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

OTHER ON-DEMAND WEBINARS

API Security - Unlock the Secrets

Bank information security

The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock the secrets to securing them. Highlights include: API Gateways are API Management tools not security; Providing audits & ensuring proper inspection on each transaction; Equipping every transaction for proper authentication and authorization.
Watch Now

Global Threat Report: The Year of the Next-Gen Cyberattack

Carbon Black

2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever attackers have become in evolving to remain undetected — using techniques such as lateral movement, island hopping and counter incident response to stay invisible. Join our discussion on the latest in threat intelligence including: The most prevalent ransomware and commodity malware families during the past year. Why we're seeing increases in nation-state cyberattacks.
Watch Now

Draft and Develop: A Solution to the Cyber Security Skills Shortage

Security Boulevard

By 2019, the nonprofit group ISACA predicts a global shortage of two million cyber security professionals. Security can no longer work in a silo-- they now need to communicate across the business and balance the needs of multiple stakeholders from product line managers to ops teams. Outreach’s CISO, Martin Rues, knew finding a candidate with the combination of DevOps, Security and Cloud would be a time-consuming exercise with low yield. He decided to invest in his teams and create an apprenticeship program to “draft and develop” internal talent, and groom then into the Cloud SecOps role that we required. Join Martin on July 26th at 1pm EDT to learn how he developed the apprenticeship program to build internal cloud security talent.
Watch Now

Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses. Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

resources