Risk-Based Security Testing

"Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results.

Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics"
Watch Now

Spotlight

RSA, The Security Division of EMC, commissioned Forrester Consulting to examine the Total Economic Impact (TEI) and potential return on investment (ROI) that enterprises may realize by deploying the company's governance, risk and compliance (GRC) solutions.


OTHER ON-DEMAND WEBINARS

Security Webinar Series Network Security with Tenable

Security is no longer just an IT function – it’s imperative to your business. Continuous network monitoring represents a compelling and effective approach to addressing security challenges by continuously measuring, analyzing and visualizing the health of your enterprise.
Watch Now

Webinar - Stop More Threats With Additional Email Security Layer

Frustrated by malware and spear phishing attacks getting past your email security defenses? According to the SANS institute, 95% of all attacks on enterprise networks gained entry through a spear phishing attack. By adding an additional email security layer that utilizes technologies such as multi antivirus scanning and data sanitization you can catch more malware threats and spear phishing attempts, which previously would have passed by undetected.Tony Berning, Senior Product Manager at OPSWAT, discusses how the Metascan Mail Agent can be used with Exchange Server or any third party email security gateway to scan email attachments and significantly increase your protection against email-borne threats. Tony also completes the webinar with a live demo of Metascan Mail Agent.
Watch Now

Why Cyber Monday attacks cost up to $3.4M per hour in losses

Zscaler, Inc.

The holiday season is approaching and for cyber criminals, this period is typically a feeding frenzy to hunt and exploit vulnerable businesses and employees. The statistics are staggering: m– 64% of organizations report an increase in cyber-crime on cyber Monday– 30 million malicious tweets are sent daily. Phishing links skyrocket by around 336% during Thanksgiving. Organizations get hit with losses of about $500k per hour when compromised.
Watch Now

What GDPR Means for Your Security

Proofpoint

For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization. Join us to hear how to. Discover and classify personal data. Protect all personal data by developing and implementing appropriate security controls. Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
Watch Now

Spotlight

RSA, The Security Division of EMC, commissioned Forrester Consulting to examine the Total Economic Impact (TEI) and potential return on investment (ROI) that enterprises may realize by deploying the company's governance, risk and compliance (GRC) solutions.

resources