Threat Hunting—A Practical Demonstration

ISACA

Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now

Spotlight

Organizations often think that they have OT cybersecurity covered with AI-based tools, but such a complex environment also requires a focus on program quality and maturity.

OTHER ON-DEMAND WEBINARS

California Consumer Privacy Act: Are You Prepared for 2020?

InfoSec Institute

The California Consumer Privacy Act (CCPA), which gives residents more control over the use of their data and regulators increased powers to punish organizations, goes into effect on January 1, 2020. With California recently becoming the fifth largest economy in the world, the CPPA is expected to have wide-reaching impact.
Watch Now

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies

IBM

Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential information across hybrid and multi-cloud environments can overwhelm even the savviest of security and IT teams, especially when resources are scarce. However, data security defenses don’t have to be costly or overly complex to carry out.
Watch Now

3 Steps for a Successful Cyber Insurance Policy Renewal

Thanks to the rapid increase in ransomware attacks, businesses are having a difficult time with cyber insurance renewals. Many organizations are finding that they can no longer afford cyber insurance, while others are declined coverage altogether.
Watch Now

Achieving Improved Cybersecurity Posture Across IT & OT Infrastructures

Forescout

Device Visibility has become the key to success for security practitioners when it comes to securing an increasingly more dispersed organisation with multiple data centres, distributed campuses and a mobile workforce. Now, smart devices are connecting previously separated IT and OT networks to automate business operations and boost efficiency introducing another layer of complexity. In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.
Watch Now

Spotlight

Organizations often think that they have OT cybersecurity covered with AI-based tools, but such a complex environment also requires a focus on program quality and maturity.

resources