Where Cyber Security and Process Safety Meet

As threats to process security and safety have heightened, the disciplines of cyber security and process safety have evolved to combat them, steadily and independently. Each has advanced its own methods, best practices, and standards.But few doubt that cyber security and process safety are linked. Is it time they go forward as one? Our select panel of cyber security, process safety and process automation specialists will attempt to answer that.
Watch Now

Spotlight

This white paper discusses the risks of email downtime and the importance of continuity in Microsoft Office 365 environments. Read on to discover how downtime may be harming your business and how you can mitigate those risks.


OTHER ON-DEMAND WEBINARS

Stop Cyber Attackers in Their Tracks with Adaptive Authentication

SecureAuth

Join SecureAuth, an innovator of access control solutions, along with Norse Corporation, the leader in live attack intelligence as they take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks.

Our Security, Delivered Your Way: Channel Profitability as an MSSP

WatchGuard Technologies

In the first webinar of this informative series, join WatchGuard and The Channel Company as they take an in-depth look at market trends and opportunities for value added resellers (VARs) transitioning to managed security service providers (MSSPs).

"Threat Update: SYNful Knock - A Cisco Implant"

"SYNful Knock, once a theoretical cyber attack, is now a reality. This Cisco router implant was recently discovered in multiple organizations and several countries. Based on research from Mandiant, a FireEye company, we believe this is just the first of many possible router implant techniques and expect similar attack methods to become more popular and sophisticated in the future. In this webinar, you’ll learn about the malware and its capabilities, as well as tools to detect the threat in your organization. Join us to discover: - How SYNful Knock works - Why SYNful Knock is so difficult to detect, even when you suspect an implanted router - How you can better detect and foil SYNful Knock - What future variants of this attack might look like"

CyberSecurity Fundamentals for Financial Industry Executives

Financial industry executives have a unique responsibility to protect investors and proprietary firm information from compromise.The notion of cybersecurity as an IT department issue has long since been re-assessed by securities firms and the topic is now taken into the board room. Discussions include much more than security of networks, systems, applications, and data; but cover a whole gamut of “what if” scenarios, company policy, and risk reducing strategy.For FINRA (Financial Industry Regulatory Authority), cybersecurity protection measures include a broad swipe approach that covers compromise through use of any electronic digital media (e.g. computers, mobile devices, Internet based systems, ipads, software solution providers). And, no matter how much of the cybersecurity task is outsourced to IT professionals, the ultimate responsibility lands on the shoulders of each firms executive leadership. For this reason Cybersecurity practices have taken a front and center seat in board room discussions that reach past IT to operations, sales, vendors, and anyone else with access to electronic company data.