Navigating the Modern Security Landscape

Navigating the Modern Security Landscape
As cyber criminals grow bolder and more sophisticated, their methods evolve. Join Allen Jenkins, InterVision’s CISO & VP of Cybersecurity Consulting, as he explores the modern security landscape.

Allen will discuss recent cybersecurity attacks – including a synopsis of the attack, its impact and deconstructing how the attack happened – and a review of mitigation steps that could help organizations prepare for and respond to these types of attacks, including:
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

How to Enforce Threat Intelligence at Your Perimeter

HealthcareInfoSecurity

Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable. So once you have that intelligence in hand, how do you enforce it at the perimeter of your network? Register for this webinar and learn about: Utilizing threat intelligence from a variety of sources; How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls.
Watch Now

Vectra and Microsoft — A Powerful Combination for Integrated Cybersecurity

One of the biggest challenges security teams are faced with is doing more with less in conjunction with protecting the growing list of attack surfaces from being breached.
Watch Now

Problem Based Cyber Security Training, Why It Matters

Our latest webinar is a Q&A with Eoin Keary and Jim Manico on why problem based training matters. This is not to be missed if you want to get the most out of your penetration testing, SAST, ASM, and risk based assessment.
Watch Now

Solving New Authentication Challenges While Finding Parity Between User Experience and Security

KuppingerCole

Unfortunately, most businesses are making the fundamental mistake when it comes to authentication and are thinking inside-out, but by thinking outside-in, they would automatically put the Customer first. Until now, strong (and not so strong) authentication to services seems to have been driven by an inside-out way of thinking. The institutions think about what works best for them: what fits into their infrastructure; what is the cheapest yet compliant approach? For customers, this means that they must use what their service provider offers to them. Companies must also be aware of insider risks and by implementing a Zero Trust approach of ‘never trust, always verify’, they can better secure the access to their assets. In this KuppingerCole webinar, we will address the following.
Watch Now