The Third Annual Information Security Survey: What's top of mind for InfoSec leaders in securing the data center

"Join Demetrios Lazarikos (Laz), two-time former CISO, former PCI QSA, and Founder of Blue Lava Consulting, as he presents the findings on securing the data center
from his company’s third annual Information Security survey, based on the responses from over 300 InfoSec leaders and practitioners.

This discussion will be critical for attendees as they prepare for the annual RSA conference to learn:

What’s top of mind for InfoSec executives in securing the data center.
Which technologies they should be evaluating as part of their Information Security program."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Definitive Guide to Endpoint Security

When it comes to cyber security, one thing is clear: the most potent threat vectors into any organization are its endpoints. Your endpoints represent fertile ground for attacks because their users, applications, and services often have elevated privileges that give cyber criminals an easy on-ramp to the inner workings and data within your organization.
Watch Now

The Current State of Cybersecurity is a 24x7x365 Game

Alert Logic

The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber-attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats, you need to leverage software plus services to augment your security team and capabilities.
Watch Now

Threat Management & OT Threat Response using MITRE

The growing threat landscape for operational technology (OT) networks, exemplified by a number of recent ransomware attacks, has prompted critical infrastructure organizations to better prepare themselves for impactful cyber incidents. To do this, stakeholders responsible for critical infrastructure and services are maturing their security operations centers (SOCs) and increasing their use of cyber threat intelligence (CTI). Many now consider adversarial Tactics, Techniques and Procedures (TTPs) to be their most valuable CTI tool.
Watch Now