Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Spotlight

"Survey Results Exposing Risky Person-to-Person File Sharing Practices

If your business is like most, it's in danger of exposing and losing sensitive data as employees move, share, and exchange information and files through unsanctioned electronic means. The risk? Your organization forfeits its competitive advantage and violates numerous laws and regulations."


OTHER ON-DEMAND WEBINARS

WEBINAR - CYBER SECURITY FOR MANAGEMENT

Cyber Security, what it is, and what does my organisation need to be doing to make sure Cyber Security isn't a risk we can't handle? This is a question that is asked a lot. In this webinar Ben Ramduny an Enterprise Security Architect at KPMG will answer this question and take you on a journey through the Cyber issues you need to be aware of and how they could impact you and your organisation. We will touch on the key threat actors and their motivations, the activities your security teams should be doing and give you some real world examples of the cyber heists that have taken place in the last 2 years. Finally we will talk about how the UK government is helping organisations defend against Cyber risk and the opportunities these bring to you.
Watch Now

Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack

Cybersecurity Ventures

When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now

"Latest DDoS Attack Trends – Excerpts from Arbor ATLAS Global Statistics"

Hear it from the experts: a realistic depiction of the DDoS attack landscape today. In this session Arbor’s Darren Anstee, Chief Security Technologist, will review current ATLAS statistics showing the frequency of attacks, the volume of attack traffic clogging the pipes of the world's largest enterprises and service providers networks and theorize as to why the upward trend in DDoS attacks is happening – and more importantly what you can do to protect your organizations from these attacks.
Watch Now

M-Trends 2018 - Understanding Today's Cyber Attack Trends

BrightTALK

Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape. During this webinar, Managing Director Chris Nutt and Vice President Russell Teague will discuss: - Longer-term trends in today's threat landscape - Sophisticated and harmful APT groups to look out for - Which organizations are most likely to be retargeted by attackers - The difficulty of finding skilled personnel and how it affects the security function - How weaknesses in security fundamentals contributed to successful compromises - Best practice red teaming tactics for improved security defense.
Watch Now

Spotlight

"Survey Results Exposing Risky Person-to-Person File Sharing Practices

If your business is like most, it's in danger of exposing and losing sensitive data as employees move, share, and exchange information and files through unsanctioned electronic means. The risk? Your organization forfeits its competitive advantage and violates numerous laws and regulations."

resources