When the unexpected strikes, what do you do next?

Natural and human-made disasters such as a hurricane, earthquake, a cyber-attack and fire are unpredictable and can occur any time. When organizations are affected by a disaster, it is essential to have comprehensive cybersecurity plans such as the Business Continuity Plan and Disaster Recovery Plan in order to function effectively - during a disaster, in the recovery phase, and after. Unfortunately, many organizations are not compliant. As a result, they can face significant challenges when a disaster strikes, including a loss of revenue as well as reputation. This webinar will educate attendants about the importance of having these plans in place and what is involved in designing and implementing them effectively.
Watch Now

Spotlight

Learn how to detect and respond to spear phishing, an attack that entices a targeted victim to access a malicious attachment or website and provide insight into confidential data.


OTHER ON-DEMAND WEBINARS

Application Security Fundamentals

CA Technologies

Veracode CTO and Co-Founder Chris Wysopal addresses the fundamentals of application security. The webinar covers some real world examples of vulnerabilities being exploited, how we can reduce the number and severity of vulnerabilities in our applications, and automated software testing techniques
Watch Now

Building a cyber security architecture to combat today’s threats

LogRhythm

The cyberattack surface is growing as organisations implement technologies such as the cloud or the internet of things (IoT). As a result, the traditional perimeter defence approach to security is no longer enough to protect your network. In this webinar, Erik Bartholomy, security architect at LogRhythm, joins Gal Shpantzer, independent security consultant, to outline ways to build a comprehensive set of defences that can keep up with today’s cyberattacks.
Watch Now

Getting Practical about Cybersecurity: What Must the Energy Sector Do to Raise Readiness?

ISA

With cyber-attacks in the global energy sector getting more frequent and sophisticated, what steps should your organization be taking to strengthen cyber hygiene and overcome its cyber confidence gap? Find out by watching this on-demand webinar from the International Society of Automation, recorded June 21, 2018. Join cybersecurity experts, Ben Collar, head of Industrial Cyber and Digital Security for Europe, Siemens, Eric Cosman, ISA99 committee co-chair, International Society of Automation, and Ted Gary, Senior Product Marketing Manager, Tenable, for an insightful discussion on this most pressing challenge facing the energy sector.
Watch Now

"Cybersecurity and Investors"

bitsight

"Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including: How investors assess cybersecurity in the M&A diligence process. What institutional shareholders want to know about cyber risks to their investments. How shareholders can meaningfully engage with companies on cybersecurity".
Watch Now

Spotlight

Learn how to detect and respond to spear phishing, an attack that entices a targeted victim to access a malicious attachment or website and provide insight into confidential data.

resources