Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

"If you made it through 2014 without suffering a significant breach, you can consider yourself fortunate. After a year filled with new exploits & high profile breaches, it's time to look back at what we learned and look ahead to the trends that will surely have an impact in 2015. Join Mike Rothman, President of Security Analyst firm Securosis, and Patrick Bedwell, VP of Product Marketing for AlienVault, for an entertaining overview of key trends you should consider as you plan for 2015.
In this session, Mike and Patrick will cover:
Trends in the threat landscape that will bring new infosec challenges
How those challenges will affect your network security strategy
A 2015 ""shopping list"" of core technologies you should consider to secure your environment in 2015"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Ponemon Survey Report: Measuring & Managing the Cyber Risks to Business Operations

Tenable

How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.
Watch Now

Practical Viewpoints: Global IT Security Compliance in 2022

Do you need to stay up to date regarding ever-evolving IT compliance mandates? Would you like to learn best practices for approaching IT security compliance? This virtual fireside chat will help you get on the right path.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

Securing CI/CD Pipelines Through Security Gates

CI/CD pipeline security has become a pressing issue for DevOps and DevSecOps teams. With today's frameworks and best practices, various security gates can be applied through the CICD process from writing the very first line of YAML in the CI, and later to the CD process.
Watch Now