The Intersection of Cybersecurity and IoT

As the Internet of Things (IoT) continues to grow rapidly, how will organizations manage the additional risks that the IoT presents within Cybersecurity? What considerations need to be made in order to address the reality that by 2020, IoT will be in 50% of all new technology? How can you gain more reasonable assurance around cybersecurity—not only of your data, but also on operations that increasingly rely on devices, sensors and the IoT.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Overcoming the Challenges of Credentialed Scanning

Tenable

Get the visibility you need to build an effective cyber exposure plan. You know authenticated or credentialed scanning provides more detail about your existing assets, along with the deepest possible understanding of the exposures in your environment. So why aren’t you taking more advantage of authenticated scanning? When we talk to security professionals who are hesitant to run credentialed scans, their story hasn't changed much in over 8 years. Two things stand out: Lack of trust. They're uncomfortable inputting credentials into a third-party, less-trusted source. Too much information. The tsunami of data generated by credentialed scanning is challenging to prioritize. If you're not taking full advantage of credentialed scanning, you need to watch this on-demand webinar to learn how Tenable and CyberArk integrate to: Provide details on what don’t you know about your environment, giving you a complete cyber exposure view.
Watch Now

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Simulated Phishing and Awareness Training

ActualTech Media

Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users. Find out how 25,000+ organizations have mobilized their end-users as their human firewall.
Watch Now

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019

Mithi

In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Watch Now