Understand and Protect the Modern Attack Surface

Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discuss best practices for minimizing and protecting these critical aspects of your attack surface.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

How to Build and Implement your Company’s Information Security Program 2021

Data is one of your business’s most valuable assets and requires protection like any other asset. How can you protect your data from unauthorized access or inadvertent disclosure? An information security program is designed to protect the confidentiality, integrity, and availability of your company’s data and information technology assets. Federal, state, or international law may also require your business to have an information security program in place.
Watch Now

Importance of Virtual Labs in Cyber Security

Virtual environments have definitely changed the course of learning for Institutions and students alike. High-in-demand skills like cyber security can now be taught in virtual environments which are ethical and safe. Virtual environments are highly flexible and versatile, you can have access to the latest software programs required in ethical hacking without making any additional expenses.
Watch Now

2022 SANS Survey: State of Cloud Security in the Enterprise

More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now