"The Changing Role of the Chief Information Security Officer"

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Defending against ransomware through comprehensive data lifecycle management

Don’t miss this insightful webinar on Data Lifecycle Management (DLM) solutions and discover how this comprehensive approach can defend your organization against the threats of ransomware
Watch Now

SANS Top New Attacks and Threat Report

Anomali

Each year, the annual RSA Conference in San Francisco features top SANS instructors presenting their look at the new attack techniques currently in use and their projections for future exploits. This fast-paced panel--moderated by Alan Paller and featuring Heather Mahalik, Ed Skoudis and Johannes Ullrich--is one of the highest-rated keynote sessions at the conference. In this webcast, SANS Director of Emerging Technologies John Pescatore will highlight: The top new attacks and threats as defined in that presentation.
Watch Now

Enterprise Phishing Attacks & the Need to Defend Mobile Endpoints

Zimperium

The new GigaOm “Phishing Prevention and Detection: A GigaOm Market Landscape Report,” designed to help C(x)Os and security practitioners evaluate phishing prevention solutions, recognizes that mobile endpoints are poised to be the next high-value target for phishing attacks. The majority of mobile endpoints lack protection beyond Mobile Device Management risk assessments; these endpoints are completely exposed to phishing and other attacks.
Watch Now

Everyone Loves Donuts, Especially Hackers

IBM

Donuts are just one of many ruses X-Force Red has up its sleeve. Tune into X-Force Red’s webinar on January 29 at 11am ET, to hear more real hacker stories. Find out how X-Force Red hackers have broken into companies worldwide, which tricks have worked and not worked, tools they have used, and what your company should do.
Watch Now