Black Hills Information Security
Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there is a prevalent attitude that it is somehow possible to get endpoint security with full synergy and it will be bulletproof and under a single pane of glass. All with cyber threat intelligence and A.I. sprinkled in with a bit of EDR magic to stop all attacks.
Watch Now
TechGig
Two seasoned cybersecurity professionals will discuss the breadth of cybersecurity in today's financial institutions, how this critical defence function operates, and what attributes a cybersecurity professional might need, to be successful in this field. They will also explore some of the recent major cybersecurity incidents from around the globe, and then talk about cybersecurity within HSBC itself.
Watch Now
In this webinar, presented in partnership with IDG, hear why mere threat prevention is no longer enough to combat today’s sophisticated threat actors. Our expert speakers will discuss the cycle your business should follow, including every step listed above—and how to evolve your cybersecurity to stay ahead of the adversary.
Watch Now
Simplilearn
What is threat hunting and why is this field gaining popularity among security organizations? Threat hunting emphasizes on a proactive approach to security and encourages organizations to anticipate and manage potential security breaches and hacks. Join Dr. James Stanger, Sr Director of Products at CompTIA, in a live webinar as he walks us through the critical areas of threat hunting and how this can enhance current cyber security measures for organizations.
Watch Now