Phishing, Malware and Incidents – Oh my! How to handle the daily deluge.

No one understands the strain of constant battle better than those in Incident Response (IR). Daily cyber assaults require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again. Breach identification takes an exorbitantly long time. And above all, attackers continue to target that last line of defense – the vulnerable, easily fooled human assets.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Understanding Cloud Security Benefits and Challenges

Vulnerabilities in the cloud are growing in number and severity, and risk leaders must learn how to respond. IBM reports that cloud vulnerabilities have increased 150% in the last five years. We are witnessing a global digital transformation, and cloud computing is the foundation and future of the digital world. It offers many benefits, but it’s crucial to understand what cloud security means and how to secure your data, applications, infrastructure, and workloads. In this free webinar, we get advice from Amazon and Google cloud security experts on how organizations can benefit from cloud security services and features and the challenges around people, processes and technologies when adopting the cloud.
Watch Now

From Zero to Immediate Impact with Foundational Endpoint Security

In the era of a highly mobile workforce, endpoints offer access to corporate resources from virtually anywhere in the world. While this helps offer flexibility to hybrid and remote workers, it also has made an attacker’s job that much easier.
Watch Now

Using AI/Machine Learning in Cybersecurity

Trend Micro

AI and machine learning have proven to be valuable technologies when it comes to detecting threats at time zero and across various vectors. But there is a time and place for its usage. Join me during my monthly threat webinar and live Q&A session to learn: How you can help improve your ability to detect zero-hour threats by implementing AI/machine learning techniques. Areas in which Trend Micro has been using these AI/machine learning techniques. Why the best threat detection comes from a cross-generational blend of technologies.
Watch Now

Active Directory Best Practices to Frustrate Attackers

Black Hills Information Security

Active Directory out of the box defaults aren’t enough to keep your network safe. Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard. But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment. Here are some baseline things you can do to make your Active Directory environment frustrating for attackers. Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now