Whitehouse-driven Cyber Security Strategy and How it affects your Business

Whitehouse-driven Cyber Security Strategy
Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Ponemon Survey Report: Measuring & Managing the Cyber Risks to Business Operations

Tenable

How does your experience compare with the findings from this Ponemon survey of 2410 infosec professionals? All information security professionals responsible for improving overall cybersecurity effectiveness are encouraged to attend this session.
Watch Now

Comprehensive Breach Protection from Network to Endpoint

Carbon black

The number of threats that can impact an organization is far greater than the number to which most analysts can manually respond. This problem is amplified by the sheer volume of alerts generated by existing tools, and the difficult task of prioritizing each one. By the time a threat is detected, investigated and manually remediated, dwell time has already been significant, increasing the risk of damage. BluVector and Carbon Black work together to provide an integrated solution for end-to-end and immediate protection from advanced malware, while also driving efficiency improvements across an organization.
Watch Now

TW-NL Cyber Opportunity Webinar

In the era of globalization, as the international division of labor goes deeper, the industrial development shifts from “manufacturing economy to service economy” and “from hardware manufacturing to soft manufacturing.” The manufacturing industry aims to enhance its international competitiveness with the added value created by the service industry. As a major producer of global ICT products, Taiwan plays an important role in the security industry supply chain during the China-U.S. trade war. It is high time Taiwan develops “Internet of Things Security” and “Secure Internet of Things” with its complete semiconductor industry supply chain. To grasp this opportunity, Taiwanese manufacturers are striving to become not only product suppliers but also cyber security solution providers by taking advantage of the global cyber security research and development. By offering products with distinguishing cyber security functions to customers based on their needs, Taiwanese manufacturers are expecting to create higher added value.
Watch Now

Analyst Roundtable: How Exposure Management Helps You Gain Visibility, Prevent Attacks, and Communicate Risk for Better Decision Making

Tenable’s Bill Olson and guest speaker, Forrester Senior Analyst Jess Burn discuss ways you can leverage cyber risk intelligence to increase and drive better business outcomes. Preventing cyber attacks requires full visibility into all your assets and exposures, predictive threat context, and objective metrics for measuring and
Watch Now