The Business Impact of Cyber Risk

InfoSec Institute

KPMG reports 68% of CEOs believe a cyberattack is a matter of when — not if. How is your organization preparing to mitigate cyber risk in the new year? Join David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations professional for strategies to help you: Discuss cybersecurity at the board level.
Watch Now

Spotlight

"Cybercriminals have discovered a new attack vector: Exploiting the trust that keys and certificates establish.

By using keys and certificates, hackers are able to go about their business on your network, authenticated, and with legitimate access. They are able to successfully steal your data while remaining undetected for months—sometimes years—at a time. Stuxnet and Duqu provided the blueprint, and now attacks on keys and certificates are commonplace. Common Trojans such as Zeus and SpyEye steal these trust assets.

Download this white paper now to learn how cybercriminals are taking advantage of keys and certificates to infiltrate your network. Understand what strategies you can implement to better mitigate against trust-based (key and certificate) attacks."

OTHER ON-DEMAND WEBINARS

Cybersecurity in a Cloud-Based World

RedVector

Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophistication and cost. During this webcast, subject matter expert Duane Anderson will: Discuss the major vulnerabilities within cloud-based systems. Explain why it’s critical to keep these systems secure. Provide simple actions (ex. browser settings) that can be taken to protect against hacks.
Watch Now

The Cyber Protection Advantage: How MSPs Can Differentiate and Grow

Channel Futures

As the threat landscape continues to evolve, data volumes continue to grow, and the way data is accessed changes, modern data protection requires a next-gen solution that goes beyond backup. With Acronis’ unique, integrated approach to data protection – cyber protection – MSPs can ensure that customer data is safe, accessible, private, authentic, and secure (SAPAS).
Watch Now

That Was Close! Tales of Near-Miss Mobile Attacks

Zimperium

100% of Zimperium customers have detected mobile threats, and many of those customers previously believed they weren’t at risk. If you think your mobile devices are not being attacked, we are sorry to tell you that you are wrong. But don’t take our word for it, join us for tales of near-miss mobile attacks from real customers. They are near-misses only because Zimperium detected the attacks, but they could have been disastrous otherwise.
Watch Now

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Spotlight

"Cybercriminals have discovered a new attack vector: Exploiting the trust that keys and certificates establish.

By using keys and certificates, hackers are able to go about their business on your network, authenticated, and with legitimate access. They are able to successfully steal your data while remaining undetected for months—sometimes years—at a time. Stuxnet and Duqu provided the blueprint, and now attacks on keys and certificates are commonplace. Common Trojans such as Zeus and SpyEye steal these trust assets.

Download this white paper now to learn how cybercriminals are taking advantage of keys and certificates to infiltrate your network. Understand what strategies you can implement to better mitigate against trust-based (key and certificate) attacks."

resources