On-demand Webinar: IoT and Cybersecurity

On-demand Webinar: IoT and Cybersecurity
Use your next 30 minutes to update you on IoT and Cybersecurity.

During this on-demand webinar we are going to talk about

  • Cyber security threats and challenges towards global or regional regulatory alignment?
  • Standards and certifications
  • Nemko Cyber Security Assurance services
  • The schemes
  • Key factors for the manufacturer to cover
  • Common Criteria
Watch Now

Spotlight

Based on a survey of 250 banking executives and in-depth expert interviews conducted by Longitude Research, this report looks at cybersecurity challenges and opportunities specifically as they relate to banks. It provides an overview of the scope of the cyberrisks faced today, then delves into particular challenges, responses and ways forward. The report includes a case study of a recent global ATM heist that illustrates the range and complexity of coordination capabilities that hackers are capable of deploying.

OTHER ON-DEMAND WEBINARS

Cyber Security in the Healthcare Industry

The healthcare industry in today’s world has experienced tremendous technological transformation. The developments have brought efficiency and significant benefits to care delivery. On the other hand, the industry faces increasing threats from cybersecurity issues.
Watch Now

That Was Close! Tales of Near-Miss Mobile Attacks

Zimperium

100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now

Healthcare's Need for Shifting Security Priorities from Prevention to Detection

BankInfoSecurity

The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly difficult to protect your digital assets and your data. You must shift security priorities from prevention to detection and remediation.
Watch Now

No Host Found: Remote Connection Security in a Post-VPN World

Internet connectivity has become a must-have feature for digital business operations. Devices on the edge provide significant value, but the constant connectivity comes with a price in terms of security risk. Hackers may target industrial controls, healthcare devices, sensors, or vehicles through their open ports and global IP a
Watch Now

Spotlight

Based on a survey of 250 banking executives and in-depth expert interviews conducted by Longitude Research, this report looks at cybersecurity challenges and opportunities specifically as they relate to banks. It provides an overview of the scope of the cyberrisks faced today, then delves into particular challenges, responses and ways forward. The report includes a case study of a recent global ATM heist that illustrates the range and complexity of coordination capabilities that hackers are capable of deploying.

resources