Mobile Security Threats & ESET Endpoint Security for Android

Looking to improve mobile device security, protect remote workers and reduce costs? Then join this webinar detailing how ESET endpoint security for Android can handle all the latest threats—without the need for a costly MDM system.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

How to Establish Visibility, Governance and a Security Culture for Multi-Cloud

Dimension Data

Is cloud security your top priority, or it is languishing somewhere on a never-ending to do list? A user-driven cloud revolution has left IT and security professionals struggling to establish visibility of data and services, and unable to regain control of the risks associated with dispersed data and multiple cloud identities. So how should organizations regain control and begin putting the “frogs back into the box” for multi-cloud security? In this webinar, we will look at how to get ahead with cloud, build a ‘cloud culture’ into your business, underpinned by a platform approach to avoid further complicating the picture to get the most from the cloud, whilst also managing the challenges of data everywhere, multiple cloud identities, mobile connections and global compliance.
Watch Now

How to Implement a Cybersecurity-first Culture for the Modern Workplace

The shift to the remote and hybrid workplace has presented new opportunities to hackers as they look to exploit weaknesses brought about by unfamiliar work practices, multiple and BYOD devices, and most importantly the busy day-to-day lives of our employees. According to email statistics, the average person receives over 100 emails per day (Earthweb), and with human error the cause of 85% of cyber security breaches (IBM) you can see why email is the number one threat vector.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Why IT Security and Project Mgmt. Training Will Be Key in 2017

RedVector

During this webcast, RedVector Senior Director of Product Management Bobby Person outlines the reasons why organizations must protect data and streamline projects, and provides training strategies to get started. Discover how your project managers, IT developers, software engineers and others can manage projects and resources to exceed expectations, mitigate network attacks and vulnerabilities, and earn important industry credentials and certifications using new project management training and IT infrastructure/security training.
Watch Now