Next-Gen Now: Outsmarting rootkits, ransomware, and zero-day attacks.

SophosLabs

From rootkits to ransomware, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work, and how to protect against them. Join Dan Schiappa, GM for Sophos Enduser Security Group, for a live webcast on Next-Generation Enduser Protection and learn how you can get innovative endpoint protection without impacting performance. Prevent: stop the exploits before they hit by thwarting the attack methods of attacks used by advanced persistent threats.
Watch Now

Spotlight

In the second half of 2016, Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals. Respondents to the survey all had responsibility and involvement in the planning, implementation, and/or operations of their organization’s security policies, processes, and technical safeguards. Participants also had purchase decision-making authority or influence for network security products and services.


OTHER ON-DEMAND WEBINARS

Turn the Tables on Adversaries with Proactive Defense

"As security professionals, defending our organizations can often times seem like a monumental, almost impossible task. Yet, there has never been as much focus, data, or development available to the security industry as there is today. The sharing of tactics, techniques, and procedures, as well as threat intelligence in an open and free manner throughout the security community is becoming standard practice, and is key to building a proactive defense posture against today’s adversaries. Join us, where the Palo Alto Networks threat intelligence team will examine the latest security trends, including: - Trends across application usage and the threat landscape, including regional and industry-specific variances - Ways to reduce the attack surface available to an adversary - Potential effects of non-standard network activity - Reuse of legacy attack tactics - Benefits of open threat intelligence sharing"
Watch Now

Many companies overlook cybersecurity during the M&A Due Diligence process.

Organizations must assess many different risks when planning to acquire another company. The cybersecurity risk that a given company presents is becoming even more crucial with the proliferation of cyber attacks.During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately evaluate the security risk an acquisition target brings to your information ecosystem.How Security Ratings can help before, during and even after an acquisition to make your entire network more secure.The value of analyzing risk using Security Ratings.A case study of a BitSight customer using Security Ratings to drive risk-based conversations with acquisition targets.
Watch Now

Take Your Security With You From On-Premises to the AWS Cloud

HealthcareInfoSecurity

Find out all the benefits of using one security solution across your on-premises data center and AWS cloud workloads. Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services throughout the enterprise.
Watch Now

Security for IBM Cloud

IBM

Recent headlines have shown that failing to secure cloud applications has dire consequences. Responsibility for securing the cloud lies not only with security teams, but also with DevOps and operations teams who are charged with ensuring appropriate security controls are used. In addition, organizations struggle to attract and retain cloud security talent to design, build and manage appropriate security operations.
Watch Now

Spotlight

In the second half of 2016, Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals. Respondents to the survey all had responsibility and involvement in the planning, implementation, and/or operations of their organization’s security policies, processes, and technical safeguards. Participants also had purchase decision-making authority or influence for network security products and services.

resources