Reducing SMB Cybersecurity Risk

Mediapro

Small- and mid-size businesses (SMBs) can no longer afford to think they’re too small to be a target for cybercriminals. That’s why SMBs should consider new or expanded investment in a comprehensive security awareness program to help address the growing risks related to cybersecurity, privacy, and regulatory compliance.
Watch Now

Spotlight

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

OTHER ON-DEMAND WEBINARS

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life. The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills. This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

Cybersecurity knowledge gap not uniform across sectors

Hrdive

Workers in finance know more than workers in other industries about cubersecurity, according to a report from Proofpoint. After analyzing more than 100 million answers to cybersecurity questions from employees in 16 industries, Proofpoint found that finance workers answered 80% of questions correctly. Transportation and education sector workers had the least knowledge among the various sectors, answering 24% of questions correctly on average, Proofpoint determined.
Watch Now

Catch the Intruder in his Tracks - Advanced Threat Hunting

panda

The threat landscape has evolved significantly over the past twenty plus years, this webinar will highlight these changes and reveal how threats have advanced. The latest security paradigm for the endpoint detection and response will be brought to light and the implications for organisations debated.
Watch Now

Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now

Spotlight

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

resources