"Professionalizing the Cloud Security Workforce"

(ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² to learn more about the CCSP, the qualifications for it and the future of cloud security
Watch Now

Spotlight

Office 365 comes with a wealth of administrator roles, roughly 22 different ones, such as Exchange or License Administrator. It looks great on the surface, and for small shops with simple use cases, the native Office 365 admin center and role delegation work relatively well. But as smaller shops gro


OTHER ON-DEMAND WEBINARS

Practical Advice for Cloud Data Security

"The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. This session will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, data security industry expert Ulf Mattson will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment."

10 worst IT security failures

Sophos

"The technology landscape appears forever vulnerable to cyber threats and network attacks. Many of these attacks have taken advantage of basic security vulnerabilities, such as poor patch management procedures, weak passwords, Web-based personal email services, and the lack of end-user education and sound security policies. This technology webinar probes 10 worst IT security failures, how their security breaches are investigated, and the impact of security compromise. The experts also discuss the best practices of designing a security policy and how Cyberoam's network security can help companies bridge their security gaps."

Cybersecurity in the Commercial Facilities Sector

National Cybersecurity Institute's

Our commercial facilities are constantly under assault by bad actors. The webinar offered expertise on how seriously they are taking the issue and what steps are being taken to secure commercial data. This webinar is part of a new series entitled “Critical Infrastructure” that covers the topics featured in NCI’s Volume I and II of “Protecting Our Future: Educating a Cybersecurity Workforce”.

How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry. The AlienVault Open Threat Exchange is different. It is one of the first (and most diverse) threat sharing networks, open to any and all who wish to join. And, free services like new ThreatFinder help make the threat data in OTX available and actionable by all. Join AlienVault VP of Product Strategy, Russ Spitler, and Systems Engineer, Tom D'Aquino for a practical session covering how to use OTX to improve network security