Operationalizing Threat Intelligence to Battle Persistent Actors

ThreatConnect

Join Andy Pendergast, co-author of the Diamond Model and co-founder of ThreatConnect and Monzy Merza, Director of Cyber Research at Splunk to see how you can apply Threat Intelligence to protect your organization and prevent future breaches. During the talk, Andy will share threat intel on a nation state threat and Monzy will do a live demonstration of operationalizing the new Threat Intelligence.
Watch Now

Spotlight

SECURITY SHOULD START WITH DATA! To do this there are four fundamentals that organisations need to do to achieve this. Check out our video to find out what these four fundamentals are.

OTHER ON-DEMAND WEBINARS

Critical Actions to Survive a Data Breach in 2019 & Beyond

BitSight

Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyber attacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Watch Now

After the Data Breach: Stolen Credentials

Security Boulevard

When usernames and passwords are compromised in a data breach, the consequences extend far beyond the victim organization due to rampant password reuse. For this reason, NIST recently recommended that organizations check users’ credentials against a set of known compromised passwords. However, by patroning dark web forums and paying for spilled credentials, enterprises indirectly support the criminal ecosystem. Furthermore, attackers often don’t publicly post stolen data until months or years after the breach, if at all. Is there a better way to follow NIST guidelines and protect users from account takeover? Join Justin Richer, co-author of NIST Digital Identity Guidelines 800-63B, and Gautam Agarwal, Shape's Senior Director of Product Management, for a lively discussion on NIST’s password recommendations and how best to prevent account takeover fraud at your organization.
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now

Business Continuity Insights, Considerations and Recommendations

Business disruptions from power outages to global pandemics impact organizations of all sizes. The goal of IT leadership within an organization is to ensure their users are still productive while maintaining some level of control of these users access to corporate resources. Creating an effective business continuity and disaster
Watch Now

Spotlight

SECURITY SHOULD START WITH DATA! To do this there are four fundamentals that organisations need to do to achieve this. Check out our video to find out what these four fundamentals are.

resources