Webinar: Enterprise Cybersecurity: The Importance of Network Analysis

In essence, your network holds the key to defending your organization. In order for any business network to function properly and efficiently, it needs to be protected from possibly harmful traffic. Information and applications that are retrieved and transmitted over a network without protection can fall victim to a variety of attacks, such as phishing, Trojan horses, spyware, self-propagating worms, and more. While we're all faced with an often overwhelming challenge to secure all of our systems and processes from deliberate harm, new technologies, network intelligence, and improved ways of thinking about cybersecurity itself can give us a fighting chance.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Practical Advice for Complying with Federal Cybersecurity Directives

Join an open source security leader and a former DoD DevSecOps engineer for actionable tips on successfully aligning your leadership, culture, and process to comply with federal cybersecurity directives.
Watch Now

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need

Sentryo

You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now

The Key Privileged Access and Security Implications of Granting Third-Party Vendor Access

BeyondTrust

Several different remote access solutions are built into Microsoft Windows to extend third-party vendors access to your systems. In this webinar, Windows and IT security expert Russell Smith weighs in on the pros and cons of using virtual private networks (VPNs), Workplace Join, Remote Desktop Services, and Web Application Proxy to provide third-party remote access.
Watch Now

Computational Thinking and Skills: A Foundation for STEM and Cybersecurity Education

NIST

Success in multiple industry sectors or any of the hundreds of new tech-heavy jobs emerging in the modern economy requires a core competency: computational thinking and skills. Computational thinking and skills extend beyond computer programming to include a larger set of knowledge and skills broadly captured by a wide swath of STEM disciplines, including cybersecurity. This webinar will explain why acquiring computational thinking and skills are important for STEM-related careers and how to incorporate and assess computational thinking and skills as part of cybersecurity education and training programs.
Watch Now