Secure Your Mobile Workforce, Improve Productivity

"In 2015 one third* of the global workforce – 1.3 billion people - will work remotely
Cost reductions and efficiency drives are the order of the day for all businesses but how can your firm carry this out without impacting employee productivity or compromising your data security? This webinar will look at how remote working, BYOD and implementing workspace solutions can help you achieve your efficiency goals without sacrificing data protection.

By attending the webinar you will:
•Discover how BYOD and workspace technology go hand-in-hand to save money
•Understand the role remote working and BYOD play in achieving in-house efficiencies
•Appreciate how workspace devices simultaneously improve employee productivity and keep confidential data secure
•Learn how to balance workforce mobility, productivity and security in a busy working environment
"
Watch Now

Spotlight

Why quantum computing is a risk to traditional cybersecurity. Quantum computing brings new cybersecurity threats. Our CTO for Cybersecurity discusses the importance of crypto-agility and why digital security should be a board level topic.


OTHER ON-DEMAND WEBINARS

"Unify your Defenses for More Effective Threat Detection & Investigation"

Alienvault

"Network IDS is one of the most effective tools for sniffing out attackers in your network. However, correlation of IDS events is needed to minimize noise and focus on the alerts that really matter. Most SIEM solutions ship with a set of ""out of the box"" correlation directives. But without specific knowledge of which IDS tool and signature set you're using, those rules are all but useless. Writing your own correlation directives is certainly an option, but that requires a great deal of time and expertise to do effectively, and re-do as the network and threats change. Join this webcast to learn: Why ""one size fits all"" SIEM correlation directives are ineffective How a unified SIEM + IDS solution simplifies threat detection and investigation Why real-time threat intelligence is essential to detect modern threats "
Watch Now

The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey

Sysdig

Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

The State of Cybersecurity Today: How Far We’ve Come & Where We are Going

MS-ISAC National Webcast – June 24, 2015 Tenable Network Security teamed with MS-ISAC to present “The State of Cybersecurity Today: How Far We’ve Come & Where We are Going,” on June 24, 2015.Led by Jeff Man, Security Strategist and Evangelist, Tenable Network Security, this session covered the following topics:Why, despite our best efforts, we’re plagued by persistent security issues.The factors driving cyberthreats and what we can do to minimize their impact.The role of information security policy and compliance regimens.Why “silver bullet” solutions are no substitute for sound processes that help increase the effectiveness of state and local government cybersecurity practices.Audience Q&A.This on-demand webinar is ideal for information security and IT professionals working for state and local governments, their agencies and departments, and others interested in improving the effectiveness of public-sector security operations.
Watch Now

Threat Based Defence: A New Approach for Cyber Security

"An increasing number of organisations and individuals fall victim to cyber attacks, despite having set defence mechanisms. Most victims implement a rather traditional perimeter-based approach to cyber security, defending against known attacks with solutions like anti-virus and firewalls, increasingly ineffective against targeted attacks by persistent adversaries. The growing number of successful cyber attacks being launched every year is a clear indication that this model is not working effectively, and is not sustainable. Forward-looking organisations are adopting a new model, informed by threat intelligence and more inclusive of the complete chain of operations necessary to launch, and defend against, a cyber attack."
Watch Now

Spotlight

Why quantum computing is a risk to traditional cybersecurity. Quantum computing brings new cybersecurity threats. Our CTO for Cybersecurity discusses the importance of crypto-agility and why digital security should be a board level topic.

resources