Supply Chain Security - The First and Weakest Link in the Chain?

Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the software, hardware, people and process components we select to create our infrastructure from day one? In this session we will talk about scoping your supply chain and applying breach avoidance, response understanding and practices to the management of your supply chain.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Ensuring Security Value through Outcome-based MDR

Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection against threats and as the scale and complexit
Watch Now

Machine Learning in Cybersecurity

Nopsec

Machine Learning in cybersecurity webinar presented by Sanja Nedic. THIS WEBINAR COVERED. Core concepts behind machine learning and main types of problems it can solve. Examples of real-world uses of machine learning in security to augment or replace rule-based or heuristic solutions to problems such as spam detection, intrusion detection, malware analysis, vulnerability prioritization, etc. Challenges of building reliable machine learning systems in security space.
Watch Now

Protecting against Advanced Email Threats: Beyond the Nigerian Prince Scam

GreatHorn

In this webinar, GreatHorn CEO Kevin O’Brien discussed how phishing attacks have evolved – from the early days of the widespread Nigerian prince schemes to today’s sophisticated and highly targeted spear phishing threats – and how our collective response has failed to keep up. By reviewing common attack patterns, he highlights areas outside of technology that are critical to protecting organizations from advanced email threats – from business processes to user engagement
Watch Now

Zero Trust: Identity Security

Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
Watch Now