Putting Trust in the Core of Technology

Microsoft is committed to putting trust at the core of technology. In this session, Brad Smith will share perspectives that will help global CIOs plan for the global policy outlook as well as better understand the priorities Microsoft has set and the actions Microsoft has taken in the past year to move the needle on this very important issue.
Watch Now

Spotlight

"Is your status among C-level colleagues slipping? Are your budgetary pitches falling flat?
If you've answered ""yes"" to either of these questions, Forrester Research, Inc.'s February 2012 report, Navigate the Future of the Security Organization can help you:
Stop reacting to a never-ending series of threats du jour (before you lose execs' respect);
Stop using fear, uncertainty and doubt (FUD) to justify your budget;
Start aligning your security strategy with business goals;
Start talking up the business benefits of your security strategy;
Transform yourself into the new chief business security officer (CBSO)."


OTHER ON-DEMAND WEBINARS

How to Social Engineer Your Users Into More Secure Behavior

KnowBe4

In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance for getting unsuspecting individuals to download and install their malicious software.
Watch Now

Cybersecurity for Small and Medium-Sized Enterprises Using the CIS Controls

CIS

This webinar seeks to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with a small number of high priority actions based on the CIS Controls. Taking the approach that not every small business owner is an IT wizard or cybersecurity ninja, this guide focuses on providing concrete steps to cybersecurity that can be achieved by SME organizations. How to protect your business with a small number of high priority actions based on the CIS Controls for concerns such as theft of company information, website defacement, phishing attacks, ransomware, and data loss.
Watch Now

Cyber Security Attacks: Are your clients prepared?

Intronis

"With all companies being at risk for a cyber security attack, it is imperative to have a security conversation with your clients. When speaking with your clients it is important to emphasize the importance of software testing and having a secure network infrastructure to prevent cyber attacks. If you address security concerns sooner rather than later, you will be able to bring more business to the table. Present yourself as a security-focused service provider to reinforce your ability to offer a wide variety of services. During this webinar, join Andrew Bagrin, CEO of MyDigitalShield, to discuss how you can: Bring the discussion of security into conversations Educate clients about security threats and how to protect themselves Offer security services to help clients worry less about security threats"
Watch Now

"What Works for Fannie Mae's Deputy CISO to Monitor Third Parties"

Many recent breaches have exploited security weaknesses in third party vendors and suppliers to attack business and government agencies. In this webinar, the Deputy CISO at Fannie Mae will detail his experience using BitSight Security Ratings to assess the cybersecurity level of third party business partners and vendors, as well as using BitSight for ongoing monitoring of externally visible signs of lapses in security levels. This presentation will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the business value gained by a repeatable and ongoing approach for monitoring third party security levels.
Watch Now

Spotlight

"Is your status among C-level colleagues slipping? Are your budgetary pitches falling flat?
If you've answered ""yes"" to either of these questions, Forrester Research, Inc.'s February 2012 report, Navigate the Future of the Security Organization can help you:
Stop reacting to a never-ending series of threats du jour (before you lose execs' respect);
Stop using fear, uncertainty and doubt (FUD) to justify your budget;
Start aligning your security strategy with business goals;
Start talking up the business benefits of your security strategy;
Transform yourself into the new chief business security officer (CBSO)."

resources