"Tips & Tricks to Reduce TTR for the Next Incident"

victorops

"Resolving an incident can be a complex process that takes a lot of time and many people. According to the 2014 State of On-Call Report, most teams report that it takes 10-30 minutes to resolve an incident and on average, 5 people are needed to help with resolution.

But it doesn’t have to be that way. In this webinar, Jason Hand will present best practices and tips for surviving every stage of the firefight - from when an alert comes in to pulling reports after it’s over. Join us to see how we do it at VictorOps. "
Watch Now

Spotlight

Information Security for Small Businesses to Large Corporations
Cyber security breaches can happen to any organization at any time. Whether you're small business with one location or a large corporation that is worldwide, an information security breach is inevitable. Do you have an IT security plan that is fast enough to cover your global assets? A network security breach can result in the loss of intellectual property, money, productivity or reputation. Regulatory fines for non-compliance may also apply


OTHER ON-DEMAND WEBINARS

Mobile Security is More than Just Mobile Device Management (MDM)

In an increasingly mobile workforce, mobile security challenges continue to bubble up to the surface. New devices, OSs and attack vectors can keep a team of security professionals busy. This 3-part TechBytes series takes an in-depth look at the evolution of enterprise mobility and the how securing devices, users and applications has rapidly evolved over the past few years. Viewers will leave with actionable insights as to how to ease the mobile security burden for their enterprise. Part 1, Mobile Security is More than Just Mobile Device Management (MDM), Fiberlink expert Jimmy Tsang discusses the evolution of devices, applications and use cases that have led to the evolution of Mobile Device Management (MDM) into Enterprise Mobility Management (EMM) which takes a holistic view of device, user, application and back-end infrastructure, enabling end to end security in ways not previously available

Ask an expert: How to start and advance your cybersecurity career

InfoSec Institute

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.

Advice for CISOs Taking a Seat at the Leadership Table

"ThreatTrack Security research underscores that CISOs and other information security leaders are often misunderstood and under-appreciated by their C-level peers. We believe that CISOs – properly empowered within an organization – are absolutely vital to an effective cyber defense. Join ThreatTrack Security and MSB Cybersecurity on Tuesday, August 26 at 2:00 p.m. ET as we share our findings and provide expert advice on what it takes build your reputation and stature within the C-suite."

From the Front Lines: The Top 10 DNS Attacks

More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.

Spotlight

Information Security for Small Businesses to Large Corporations
Cyber security breaches can happen to any organization at any time. Whether you're small business with one location or a large corporation that is worldwide, an information security breach is inevitable. Do you have an IT security plan that is fast enough to cover your global assets? A network security breach can result in the loss of intellectual property, money, productivity or reputation. Regulatory fines for non-compliance may also apply

resources