Redefine Threat and RIsk Management

The rising scale and complexity of IT has opened more opportunities than ever for abuse and attack. Can our latest advances in data science and software-based environments also redefine threat and risk management options? This presentation highlights examples of new and innovative approaches that successfully have reduced risk even across different-sized organizations
Watch Now

Spotlight

For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.


OTHER ON-DEMAND WEBINARS

Disaster Recovery: What to Expect When You Declare a Disaster

oin Catherine Roy, Sr. Manager of the HOSTING Project Management Organization and Brian Frank, HOSTING Cloud Services Manager, for a discussion on best practices in declaring a disaster and implementing your disaster recovery solution. Having implemented over 300+ disaster recovery solutions, the team will draw upon real-world experience and give valuable, practical advice for handling your DR solutions in all cloud environments -- large, small, simple and complex. The following topics will be covered: •Business Continuity •Prepping for Disaster •Disaster Recovery Testing •What happens when you declare a Disaster

Protect Privileged Accounts with SIEM

"Both insider and external threats will attempt to exploit highly privileged administrative accounts to perform unauthorized tasks that could lead to data theft or sabotage. In this session we will demonstrate how a SIEM can enable organizations to adopt best practices for managing privileged user activity such as: Least Privilege Separation of Duties Audit Privileged Sessions Forbid All Access Accounts Real Time Response to Suspicious Privilege Escalation"

How to Keep on Top of Security Hygiene Without Sacrificing Speed and Efficiency

Infosecurity Magazine

In today’s threat-laden cyber landscape, it’s never been more important for companies to practice strong security hygiene and leverage a layered security approach. However, how do you actually go about taking the steps to embody hygiene best practices without impeding the day to day running of your business?This is no easy task, bringing about a plethora of challenges that make doing so a significant challenge. There are, of course, a lot of best practices out there, but how do you realistically bring those frameworks to life within your organization.

"Are Advanced Persistent Threats Hiding in Your Network?"

dell

"During this interactive webinar, Justin Turner, Delivery Team Manager from the Targeted Threat Hunting & Response Team, will share why it is critical to identify targeted threat indicators of attacker presence and leverage threat intelligence to provide context to determine how to engage and resist the adversary. In addition you will: - Learn what Targeted Threat Hunting is and why it is important. - Hear real-world examples of previous incidents and how targeted threat hunting was used to remove entrenched adversaries. - Receive a standard list of questions that should be answered during an engagement."

Spotlight

For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.

resources