Webinar: 5 Cybersecurity Trends for 2016

Do you know where your enterprise will be most at risk in 2016? Every new year brings unwelcome security surprises. But the next 12 months will witness a new twist in the cybersecurity story.The very development that’s exciting so many enterprises – the Internet of Things (IoT) – could leave them critically exposed. Embedding IP into more devices opens up multiple points of entry on what we carry, wear, or attach to machines. Suddenly, the threats are getting close and personal–everywhere.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense

VMware

Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge. In this webinar, we will take a look how network virtualization can extend your security from data center, to branch, to cloud, to edge. In this webinar, you will learn: The latest outlook on the growing cyber-security threats. How you can better protect your data center by focusing on your network.How to extend your network and security to branches and beyond with software-defined WAN.
Watch Now

Managing the Insider Threat—Why Visibility Is Critical

ObserveI

Only with full visibility into employee or third-party activity across a company network can even the earliest indicators of an insider threat be detected. By monitoring both user and file activity, security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach. Research from The Ponemon Institute shows that Financial Services organizations face the highest penalty costs of any other industry ($12.05 million annually) when they experience an insider-led incident, though they are closely followed by the Energy & Utilities and Retail sector. This cost alone is a very concrete reason to address what otherwise might seem to be an invisible problem.
Watch Now

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention

CyberX

This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.
Watch Now

Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic

Alert Logic

As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises. In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection.
Watch Now