New Research Identifies Changes In Cyber Threats

The Digital States Performance Institute (DSPI) invites you to join the State of Nevada, Symantec and Verizon as we discuss surprising new developments in cyber security threat identification, defense and response.Get the latest research related to:The changing nature of attack profiles Key findings from the 2013 Data Breach Investigations Report Proactive practices for an active cyber defense.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

MCAFEE + CISCO THREAT RESPONSE COLLABORATION & INTEGRATION

Dyntek

Today, organizations are faced with increasingly complex systems driven by McAfee + Cisco-Threat Response Webinar Blogdissolving enterprise boundaries, ubiquitous user data in the cloud and an increasing volume and sophistication of cyber attacks across multiple vectors. Siloed cyber security solutions only add complexity and restrict your ability to protect and respond to advanced attacks, while increasing costs and management overhead.
Watch Now

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

Radiflow

Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process safety, securing IT assets was by far not their top priority. As industrial networks are becoming increasingly complex, geographically dispersed and interconnected, however, both impact and probability of numerous cybersecurity risks are growing, and the biggest challenge for CISOs nowadays is no longer how to persuade OT people to take notice, but how to evaluate a vast number of potential threats and to prioritize the actions needed to protect their networks.
Watch Now

Ask an expert: How to start and advance your cybersecurity career

InfoSec Institute

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.
Watch Now

Creating a Modern Identity Strategy for Hybrid IT Environments

| Sponsored

The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-time deployments and the hardware, softwa
Watch Now