ACG
Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now
Cybereason
This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology. We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now
Eurofins Scientific
From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI-powered technology offers a proven approach to combat the threats that could already be inside the network – before they escalate into a crisis. Join Eurofins’s VP of Cyber Security, Sean Walls, and Darktrace’s Director of Enterprise Cyber Security, David Masson, to discuss how advances in autonomous AI are shaping the way security teams visualize, detect, and respond to emerging threats – all in real time.
Watch Now
More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now