Top 5 Cybersecurity Misconceptions

Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

OTHER ON-DEMAND WEBINARS

Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

From Zero to Immediate Impact with Foundational Endpoint Security

In the era of a highly mobile workforce, endpoints offer access to corporate resources from virtually anywhere in the world. While this helps offer flexibility to hybrid and remote workers, it also has made an attacker’s job that much easier.
Watch Now

3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Infocyte

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed.
Watch Now

Mobile IoT – Are you Cybersecurity Ready?

MEF

The Mobile IoT market is set for rapid growth over the coming years and providers are concentrating more on rapid widescale deployment with security often being a later consideration. This is not a tenable position as IoT applications can be mission critical and security needs to be at the forefront of any solution. In this webinar, MEF Advisor Andrew Parkin-White is joined by two security experts: Ian Smith, IoT Security Lead at the GSMA and Stephen Fitzpatrick, VP IoT at Cellusys.
Watch Now

Spotlight

Industry 4.0 is transforming the manufacturing and industrial landscape by integrating advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing. While these innovations provide immense benefits, they also ramp up the risk of cyberattacks due to increased connectivity and a lar

resources