Problem Based Cyber Security Training, Why It Matters

Problem Based Cyber Security Training, Why It Matters
Our latest webinar is a Q&A with Eoin Keary and Jim Manico on why problem based training matters.

This is not to be missed if you want to get the most out of your penetration testing, SAST, ASM, and risk based assessment.
Watch Now

Spotlight

It is important to note that ransomware attacks are not limited to standard IT systems. In fact, medical devices often present an enticing entry point for attackers due to the inherent difficulty in updating firmware on these devices. Consequently, medical devices can serve as a link within a complex chain of attack, allowing at

OTHER ON-DEMAND WEBINARS

Threat Hunting—A Practical Demonstration

ISACA

Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now

Security Weekly Webinar: Cyber Threat Intelligence – How to Do It Wrong

ThreatConnect

Tune in to watch Security Weekly’s Paul Asadoorian and John Strand discuss threat intelligence with Jason Cohen, Threat Intelligence Research Engineer at ThreatConnect. Learn about the shortcomings and misuses of threat intelligence to better understand how it can be used effectively and bring real value to your security operations.
Watch Now

Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Forescout

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity. In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now

Spotlight

It is important to note that ransomware attacks are not limited to standard IT systems. In fact, medical devices often present an enticing entry point for attackers due to the inherent difficulty in updating firmware on these devices. Consequently, medical devices can serve as a link within a complex chain of attack, allowing at

resources