Transform Security and Risk Into a Business Function: A Panel Discussion

Gartner

As organizations and governments race towards digital transformation, they expose themselves to a variety of risks that traditional information and cybersecurity practices are not accustomed to encountering. In the face of technology evolution, regulatory complexity, an increasing threat landscape and limited resources, will security and risk leaders be able to align to the ambitious goals set by their business leaders? In this unique complimentary live video discussion, 4 leading Gartner security & risk experts debate how the nature of risks are evolving and what you can do to transform security and risk into a business function.
Watch Now

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

OTHER ON-DEMAND WEBINARS

Moving Beyond Blindspots: How to Reduce Security Risks in the Cloud

Understanding your complex cloud environment is tricky. Workloads, containers, and serverless functions are added and removed constantly. Vulnerabilities are endless. Security staff is in short supply. But here’s the reality: cloud security is built in incremental steps. And process improvement involves multiple stakeholders — not just security teams.
Watch Now

Simulated Phishing and Awareness Training

ActualTech Media

Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users. Find out how 25,000+ organizations have mobilized their end-users as their human firewall.
Watch Now

2018 Threat Report and Top Malware

Webroot

If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Join this Channel Futures webinar to learn more about the discoveries and analysis of threat activity throughout 2017, the top malware of 2017 and how to be better equipped to overcome modern cybercrime in 2018.
Watch Now

Strengthening Industrial Cybersecurity with Internal Segmentation

This session shares recent changes in the ICS cyber threat landscape and introduces EdgeIPS™ Pro, developed by TXOne Networks to provide ICS network segmentation, trust lists, and virtual patch technology to make up the new cybersecurity foundations of your shop floor network.
Watch Now

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

resources