"The next step for a better customized defense"

"As the threat landscape continues to evolve and expand, how best can your security solution adapt to the changes? To keep up with the pace, IT security needs quick and accurate information in order to identify and remediate these incidents. The new updates for Trend Micro OfficeScan and Trend Micro Control Manager offers you just that. A better security with products working together to provide customized defense to help you rapidly adapt and respond to this ever evolving threats.
Join this webinar to learn:
1.Trend Micro’s new technology to protect against Ransomware
2.What’s new with the release of OfficeScan 11 SP1 and Control Manager 6.0 SP3
3.How does our “Connected Threat Defense” fits in your company security"
Watch Now


HP reveals that the Internet of Things (IoT) is far from secure. According to an ongoing HP IoT study series, home security systems are not nearly as secure as you may think.


Top Security Trends for 2016-2017


During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational technology and the Internet of Things. This webinar reviews the lessons learned and informs listeners how to use the past to create the future.
Watch Now

Symantec Monthly Threat Webinar - November update

Hear the latest on the current website security threats for November 2015 from Symantec.
Watch Now

How to Hack a Human: Defending Against Social Engineering Attacks

Social Engineering

The social engineer is often a highly-skilled, highly-motivated adversary. As people and their working environment become more connected, hacking the human rather than the network is often the most effective route for an adversary. As any information security professional knows, the human is the weakest link in any defense strategy and consequently it is essential to understand how social engineers manipulate individuals and exploit security weaknesses. During this session the speakers will share their insight into social engineering attacks and provide practical advice on how to defend your organization.
Watch Now

Reducing SMB Cybersecurity Risk


Small- and mid-size businesses (SMBs) can no longer afford to think they’re too small to be a target for cybercriminals. That’s why SMBs should consider new or expanded investment in a comprehensive security awareness program to help address the growing risks related to cybersecurity, privacy, and regulatory compliance.
Watch Now