Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need


You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now


Created by #UMSocial within the Office of the Vice President for Communications at the University of Michigan.


Why IT Security and Project Mgmt. Training Will Be Key in 2017


During this webcast, RedVector Senior Director of Product Management Bobby Person outlines the reasons why organizations must protect data and streamline projects, and provides training strategies to get started. Discover how your project managers, IT developers, software engineers and others can manage projects and resources to exceed expectations, mitigate network attacks and vulnerabilities, and earn important industry credentials and certifications using new project management training and IT infrastructure/security training.
Watch Now

The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey


Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

How to Remove Complexity as a Threat to Security


No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

How to Enforce Threat Intelligence at Your Perimeter


Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable. So once you have that intelligence in hand, how do you enforce it at the perimeter of your network? Register for this webinar and learn about: Utilizing threat intelligence from a variety of sources; How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls.
Watch Now