ON-DEMAND WEBINAR: HOW TO MANAGE INFORMATION SECURITY RISK IN YOUR PARTNER ECOSYSTEM

Did you know that sharing network access with your business partners could be putting you at risk of third-party breach? These breaches can be very damaging and may account for major losses in data, time, and resources. If you’re looking for a better risk management method, you’re not alone.Throughout this webinar you will learn more about:Security risks that could be facing your corporation today.How you can utilize selection criteria to build the best solution.Methods you can use to assess partner security risk.Methods you can use to assess partner security risk.
Watch Now

Spotlight

Learn how threats like malware and various social engineering techniques are used to commit fraud and create data breaches in the financial services market. You will also gain an understanding of the differences between passive and active defenses and how to select and deploy an active defense - all to stop the bad guys before they can take over accounts, steal money and ruin your financial institution's reputation in the process.


OTHER ON-DEMAND WEBINARS

Unify your Defenses for More Effective Threat Detection & Investigation

Network IDS is one of the most effective tools for sniffing out attackers in your network. However, correlation of IDS events is needed to minimize noise and focus on the alerts that really matter. Most SIEM solutions ship with a set of "out of the box" correlation directives. But without specific knowledge of which IDS tool and signature set you're using, those rules are all but useless. Writing your own correlation directives is certainly an option, but that requires a great deal of time and expertise to do effectively, and re-do as the network and threats change

BYOID: New Ponemon Institute Study on Key Digital Identity Trends

"While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID. Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud."

Avoiding the Headlines: 5 Critical Security Practices to Implement Now

"2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they? Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now. Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn · Possible gaps left by the compliance-first approach to security · How to limit vulnerabilities across traditional, virtual and cloud infrastructures · Five best practices to avoid a major security breach in 2015"

WEAPONS OF MASS DESTRUCTION - SOCIAL ENGINEERING

SBS CyberSecurity

The 2016 Verizon Data Breach Investigations Report suggests that 30% of people will open a phishing email. With hundreds of thousands of people working in financial institutions around the country, we have a high potential level of risk. Cybercriminals have also weaponized tools into phishing emails that can compromise our systems and takeover control. Phishing campaigns have been automated and are distributed as a “crime-as-a-service” to other cybercriminals looking for repeatable processes to conduct mass scale phishing campaigns.

Spotlight

Learn how threats like malware and various social engineering techniques are used to commit fraud and create data breaches in the financial services market. You will also gain an understanding of the differences between passive and active defenses and how to select and deploy an active defense - all to stop the bad guys before they can take over accounts, steal money and ruin your financial institution's reputation in the process.

resources