Practical Advice for Complying with Federal Cybersecurity Directives

Practical Advice for Complying with Federal Cybersecurity
Join an open source security leader and a former DoD DevSecOps engineer for actionable tips on successfully aligning your leadership, culture, and process to comply with federal cybersecurity directives.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Definitive Guide to Endpoint Security

When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are its endpoints. Your endpoints represent fertile ground for attacks because their users, applications, and services often have elevated privileges that give cyber criminals an easy on-ramp to the inner workings and data within your organization.
Watch Now

Why Security Awareness Should Not Stop at Phishing

Mediapro

If you’re keeping even half an eye on the InfoSec news cycle, you know how big of a problem phishing is. The annual Verizon data breach found again this year that phishing was the leading way for malware to enter networks, with the average company reporting that 94% of detected malware came in via email. Thirty-two percent of confirmed breaches started with phishing, again the most common tactic. It makes sense, then, that so much security awareness content out there is focused on this threat. Some vendors make their business on it almost completely, with this trend extending to the phishing simulator emerging as a key selling point for those in the security awareness business.
Watch Now

The Power of AI to Disrupt Security Ops

GovInfoSecurity

Many of today's companies are hesitant to adopt new security technologies - particularly AI. The truth is AI is successfully disrupting many areas of security operations and shifting us away from the traditional SOC and man-led threat intelligence. In this webinar, Chris Calvert will introduce the concept of autonomous security driven by AI, probability theory and advanced algorithms. These new technologies apply reasoning, judgement and experience to identify threats and make decisions at the scale, speed and consistency no human can match, freeing up analysts for higher level investigation and response actions.
Watch Now

ON-DEMAND WEBINAR Why Cyber-Physical Convergence Really Matters

Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it really mean and why does it matter? In this session we’ll discuss: The evolution of converged security Cyber-physical security convergence vs. security convergence Preparing for, and protecting against, cyber-
Watch Now