Protecting Against Spear Phishing

Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization
Watch Now

Spotlight

The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information security.
HEISC works to improve information security & privacy programs across the higher education sector.


OTHER ON-DEMAND WEBINARS

Five Tips for Approaching Customers about Cloud Security

Intronis

"The adoption of cloud technology is growing exponentially, and a recent study from Computerworld indicates that cloud computing spending will increase 42% in 2015. Another study from IBM found that 75% of security decision makers expect their cloud security budgets to increase in the next five years. With the wealth of options on the market, evaluating the security and compliance of cloud solutions can be a challenge for MSPs. Approaching customers about cloud technology can be just as daunting, particularly when “cloud security” is seen as an oxymoron in many circles. Watch this webinar for tips on easily broaching the subject of cloud security with your customers. Neal Bradbury, co-founder and vice president of channel development with data protection solutions provider Intronis, and Andrew Bagrin, CEO and founder of Security-as-a-Service provider My Digital Shield, will review best practices for approaching customers about cloud security. Among key discussion points are: Tools to evaluate SMBs’ current level of security The impact of lack of cyber security How the cloud is more secure than on-prem options Investments in physical v. cyber security How cloud-based security helps with industry compliance"

What is Bomgar Privileged Access Management?

Bomgar Privileged Access Management enables security professionals to control, monitor and manage access to critical systems by privileged users and third-party vendors. Check out this short video to learn more!

An Introduction to the Value of Peakflow SP 6.0 and Flex Licensing

Modern day service provider networks are complex and under constant threat. In this session, we’ll introduce you to the major improvements in performance, scalability and financial benefits of Peakflow SP 6.0’s new Flex Licensing that enable you to meet challenges of today and the future

"Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day"

fireeye

"Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack. In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics."

Spotlight

The Higher Education Information Security Council (HEISC), along with EDUCAUSE and Internet2, held its annual Information Security Awareness Video & Poster Contest, an event that allows college students to win prizes, gain experience, and earn recognition by creating a PSA about information security.
HEISC works to improve information security & privacy programs across the higher education sector.

resources