Security Incidents are the New Normal - Common Gaps in Network Security Strategies

In a survey conducted by Forescout and Frost & Sullivan last October, the reality of how many “serious incidents” were faced by large enterprises is discussed. The results are shocking, in this webinar we will look at the results and dissect the findings to demonstrate how businesses are facing attacks and dealing with incidents.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

HIPAA Compliance – Are You Staying Healthy?

Alert Logic

The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*. But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement HIPAA security controls to comply with HIPAA regulations can be overwhelming. We can help you break it down. In this webinar we will walk through: The current state of HIPAA compliance, and how businesses are stacking up. Top reasons for HIPAA compliance failures and how to avoid them.
Watch Now

How to Spot a Phishing Email – 5 Signs to Look Out For

MediaPRO

This attempt went on to ask why the sender wouldn’t pay an “invoice” attached to the email. Our IT staff later confirmed this attachment carried a ransomware payload. Like the confusing influx of different Oreo flavors in recent years (cotton candy Oreos, really?), the variety of phishing email attempts has blossomed. The “shock and awe” method described above is not a new tactic, though the use of vulgarity seems to be a relatively new variation. Fake shipping confirmations. Tax-related W-2 requests. Emails requesting password resets for social media accounts, online banking, you name it. These are just a few ways scammers use social engineering to bypass technological safeguards and compromise sensitive data.
Watch Now

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need

Sentryo

You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now

NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now