Stage 3 – Management: The third layer of your cyber-defense-in-depth strategy

Stage 3 – Management: The third layer of your cyber-defense
When it comes to larger or more complex organizations, managing cyber security risks requires a more intensive approach than implementing basic security protection.

Embedding risk-based security controls, managing the security of supply chains, and carrying out regular audits are some of the many measures an organization may need to take to manage and reduce risk.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Machine Learning in Cybersecurity

Nopsec

Machine Learning in cybersecurity webinar presented by Sanja Nedic. THIS WEBINAR COVERED. Core concepts behind machine learning and main types of problems it can solve. Examples of real-world uses of machine learning in security to augment or replace rule-based or heuristic solutions to problems such as spam detection, intrusion detection, malware analysis, vulnerability prioritization, etc. Challenges of building reliable machine learning systems in security space.
Watch Now

How to Spot a Phishing Email – 5 Signs to Look Out For

MediaPRO

This attempt went on to ask why the sender wouldn’t pay an “invoice” attached to the email. Our IT staff later confirmed this attachment carried a ransomware payload. Like the confusing influx of different Oreo flavors in recent years (cotton candy Oreos, really?), the variety of phishing email attempts has blossomed. The “shock and awe” method described above is not a new tactic, though the use of vulgarity seems to be a relatively new variation. Fake shipping confirmations. Tax-related W-2 requests. Emails requesting password resets for social media accounts, online banking, you name it. These are just a few ways scammers use social engineering to bypass technological safeguards and compromise sensitive data.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

5 Security Measures You Need to Take to Keep Your Business Safe from Ransomware

Businesses are under attack, hackers are getting smarter, and the cost of a ransomware attack is going up. The average cost of an attack for small to medium size businesses? $200,000. For enterprise organizations, attacks cost, on average, $14.8 million annually. And even, scarier, 60% of small to medium-sized businesses that are hacked go out of business within six months.
Watch Now