Security Analytics: How to Identify True Risks to Your Data

Imperva

The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies. Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.
Watch Now

Spotlight

“Mobile moments” — when employees access immediate, contextually relevant insights from a mobile device — are poised to redefine how people conduct business. Customers will expect your employees to have a wealth of contextually relevant data at their fingertips along all steps of the customer journey, while the cost-savings opportunities of managing back-end systems with the insights from mobile devices will be paramount to maintaining a reliable ecosystem

OTHER ON-DEMAND WEBINARS

Identity Security on the Rails: Simple Solutions to Disrupt Identity-Based Attacks

In today’s distributed work environment, Identity is the new perimeter, so it should come as no surprise that attackers consider identities both on-premises and in the cloud as High-Value Targets. With a valid identity, attackers can move laterally, escalate privileges, identify critical servers, and execute damaging attacks. Fortunately, Identity Security addresses identity risks and detects identity-based attacks.
Watch Now

Importance of Virtual Labs in Cyber Security

Virtual environments have definitely changed the course of learning for Institutions and students alike. High-in-demand skills like cyber security can now be taught in virtual environments which are ethical and safe. Virtual environments are highly flexible and versatile, you can have access to the latest software programs required in ethical hacking without making any additional expenses.
Watch Now

11 Ways to Defeat Two-Factor Authentication

KnowBe4

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Highly Caffeinated InfoSec

Black Hills Information Security

Whether you are brand new to InfoSec or a skilled veteran there are ways to push the limits and learn more about this exciting profession. Knowledge doesn’t always come from a classroom but instead can come from networking with other cybersecurity individuals and finding ways to hack anything around you. Mike Felch and Beau Bullock have started various InfoSec meetup groups, spoken publicly, written blog posts, and are on podcasts to help share and learn more at the same time. In this webcast they share a few tips for waking up your inner hacker.
Watch Now

Spotlight

“Mobile moments” — when employees access immediate, contextually relevant insights from a mobile device — are poised to redefine how people conduct business. Customers will expect your employees to have a wealth of contextually relevant data at their fingertips along all steps of the customer journey, while the cost-savings opportunities of managing back-end systems with the insights from mobile devices will be paramount to maintaining a reliable ecosystem

resources