Proactive IT Risk Assessment Strategies

Please join distinguished analyst John Pescatore, of leading analyst firm Gartner, and Andre Gold, founder of Gold Risk Management & former security head at ING, for an exclusive on-demand webcast: "Staying Ahead of Changing Threats."View this on-demand webinar now to learn:Which attacks are happening now and what's projected over the next couple years.How multistaged threats are necessitating new vulnerability management practices.
Watch Now


Many recent retail breaches share a common data point: They were the result of an adversary compromising a third party and then using it as a pivot point to compromise the retail organizations.Although third parties offer many benefits to retailers, including providing organizations access to servi


Insider Threats - How to Prevent, Detect and Re-mediate Insider Attacks

Join our webinar "Insider Threats - How to Prevent, Detect and Remediate Insider Attacks" as we discuss insider threats and what cybersecurity professionals are doing to prevent, detect and remediate them. We will also review the key findings of the 2015 Insider Threat Report, including: • 62 percent of security professionals say insider threats have become more frequent in the last 12 months. But only 34 percent expect additional budget to address the problem. • Fewer than 50 percent of organizations have appropriate controls to prevent insider attacks. • 62 percent of respondents say that insider attacks are far more difficult to detect and prevent than external attacks. Panelists: Zach Lindquist (Sergeant Laboratories), David Thornbury (Watchful Software), Mike Tierney (SpectorSoft), John Yun (Palerra), Matt Zanderigo (ObserveIT)

Understanding your Attack Surface - Research into FT30 organisations


Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions.

SANS Top New Attacks and Threat Report


Each year, the annual RSA Conference in San Francisco features top SANS instructors presenting their look at the new attack techniques currently in use and their projections for future exploits. This fast-paced panel--moderated by Alan Paller and featuring Heather Mahalik, Ed Skoudis and Johannes Ullrich--is one of the highest-rated keynote sessions at the conference. In this webcast, SANS Director of Emerging Technologies John Pescatore will highlight: The top new attacks and threats as defined in that presentation.

Do you know where your next cyber security threat is likely to come from?

"The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, ""people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness"". Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks: - Naive and disgruntled end-users - The disappearance of the corporate perimeter - Mobile devices becoming ideal entry points - Lack of layered defenses"