Cybersecurity Ventures
When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now
Tenable
Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimated nearly 19,000 new vulnerabilities would be disclosed. There are just too many to discover, assess and effectively mitigate. Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Bill Olson, Technical Director with Tenable, for an on-demand webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.
Watch Now
You’ve seen the headlines – organizations with their data held hostage and ransom payments to perpetrators to restore it. Time is of the essence during a ransomware attack. Is your organization prepared? Do all your teams know their roles and responsibilities? Do they have the authority to make immediate decisions?
Watch Now
ExtraHop
For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now