The Path Forward for Cybersecurity's AI: Not All AI Are Created Equal

Bank information security

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.
Watch Now

Spotlight

Implementing Duo produced time savings for end users, help desk staff, security analysts, and other IT staff compared to the organizations’ prior solution. Duo also decreased those organizations’ risk of a credentials-related security breach by providing better intelligence around all authentication attempts, simplifying the com

OTHER ON-DEMAND WEBINARS

Critical Actions to Survive a Data Breach in 2019 & Beyond

BitSight

Learn how to prepare for and survive a data breach. With large-scale data breaches continuing to make the headlines in 2018, today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyber attacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Watch Now

How To Create a Successful Cyber-Security Policy

DP Solutions

As security breaches become the new normal, having a cyber-security policy in place for your organization becomes essential. Technology alone cannot prevent a cyber-attack; therefore, businesses need to create a culture of security among their staff. The best way to do this is with cyber-security policies: a series of rules that define what end users may or may not do with their technology. In this on-demand webinar, DP Solutions’ Senior IT Risk Advisor Ben Schmerler discusses how to develop a solid and reasonable policy for your organization. From this webinar, you will learn: What information should be covered in your policies. Special considerations such as mobile devices, social media, compliance or legal concerns. How to properly document your policies. How to determine if your employees are following the policies. Technology options to enforce the policies.
Watch Now

Cyber Value-at-Risk Webinar

Uleska

Cyber Value-at-risk (VAR) offers a revolutionary industry approach helping Enterprises with effective cyber management and vulnerability remediation prioritization. Simply classifying risks in broad terms such as “high”, “medium” or “low” does not tell you a business story. Understanding the business impact of various technical cyber issues, including responses costs, replacement costs, and potential regulatory fines, allows a business vision into true cyber business risk. Why attends this webinar? 1) Understand how cyber security compliance issues can be subject to regulatory fines.
Watch Now

IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly

IBM

Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for federation standards, they might be solely backend services accessed via APIs, or even legacy applications exposed only via some sort of middleware. However, agility in the digital journey mandates that IT can provide seamless access to all these services while keeping in control and enforcing security. Identity as a Service offering, whether deployed from a public or hybrid cloud, can take a central role, by acting as the common fabric connecting all the users and all the services. Such services include support for adaptive authentication, auditing features, broad federation services, authorization capabilities, and various capabilities.
Watch Now

Spotlight

Implementing Duo produced time savings for end users, help desk staff, security analysts, and other IT staff compared to the organizations’ prior solution. Duo also decreased those organizations’ risk of a credentials-related security breach by providing better intelligence around all authentication attempts, simplifying the com

resources