Webinar: Certified Chief Information Security Officer (C|CISO) Training-Why CISO?

The best defense against ever-present and rising cyber threats and attacks is a well-trained cyber workforce. Our cybersecurity training portfolio covers the skills you need to get from the foundational level to expert level of cyber professional.NCI’s professional training programs will help you increase or enhance your current cybersecurity skills or prepare for a new career through training or preparation for certification. Our cybersecurity training not only prepares you for industry-recognized certifications, it also provides you with the means to truly comprehend what you’ll learn through real-world examples and expert instruction. All NCI courses will be offered face-to-face.
Watch Now


Learn why Identity matters, what an Identity solution is, and how an Identity solution can help your business. How can an Identity solution help your business be more secure -- and productive? Today’s business environment is anything but simple – and increased cyber threats just complicate things mo


Stegoloader- A Stealthy Information Stealer

"Operating from the belief that education is the most powerful weapon, one of our foremost security researchers will provide an analysis on a recently documented stealthy malware family named Stegoloader. Our upcoming webcast will unveil the sophistication of Stegoloader’s characteristics which make it hard to analyze and detect. This webcast will help you understand the nature of Stegoloader in order to counter it more efficiently and effectively. Pierre-Marc Bureau, Senior Security Researcher from the Counter Threat Unit (CTU), will discuss how Stegoloader cloaks its main component as a harmless Portable Network Image (PNG) while it extracts and executes malicious code hidden within an image. Although CTU researchers have not observed Stegoloader being used in targeted attacks, it has significant information stealing capabilities. Malware authors are constantly looking for ways to adapt and improve detection mechanisms, which makes Stegoloader a prime candidate for cyber-criminals arsenals. Learn how digital steganography may be a new trend for threat actors globally."

Anarchy, Chaos, and US Healthcare Security - Where Will It End?

"This webinar will attempt to briefly describe the complexities of the US Healthcare system as it transforms from a provider pushed proposition to one that is consumer driven and the challenges that such a transformation present from a security and privacy perspective. This complexity and the challenges that will be discussed and others represent some of the many reasons that healthcare data is becoming the ""Happy Hunting Grounds"" for cyber bad guys and what we can do as security professionals to try and stem the tide in storm of data breaches that is going to get worse before it gets better"

Avoiding the Headlines: 5 Critical Security Practices to Implement Now

"2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they? Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now. Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn · Possible gaps left by the compliance-first approach to security · How to limit vulnerabilities across traditional, virtual and cloud infrastructures · Five best practices to avoid a major security breach in 2015"

AV isn't Dead. It's Evolving.

Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.