Live Broadcast: Be Empowered to Threat Hunt in 2019

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

Zimperium

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

Sacred Cash Cow Tipping 2019

Black Hills Information Security

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there is a prevalent attitude that it is somehow possible to get endpoint security with full synergy and it will be bulletproof and under a single pane of glass. All with cyber threat intelligence and A.I. sprinkled in with a bit of EDR magic to stop all attacks.
Watch Now

BlackBerry Cylance 2019 Threat Report Highlights

Cylance

The BlackBerry Cylance 2019 Threat Report Highlights webinar is an opportunity to examine our conclusions with the researchers and analysts who authored the report. Join us for an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts will offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
Watch Now

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense

VMware

Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge. In this webinar, we will take a look how network virtualization can extend your security from data center, to branch, to cloud, to edge. In this webinar, you will learn: The latest outlook on the growing cyber-security threats. How you can better protect your data center by focusing on your network.How to extend your network and security to branches and beyond with software-defined WAN.
Watch Now