Whitehouse-driven Cyber Security Strategy and How it affects your Business

Whitehouse-driven Cyber Security Strategy
Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

OTHER ON-DEMAND WEBINARS

Cut Your Cybersecurity Risk with an Industry-Leading Password Safe

While compromised passwords remain the top cause of breaches and attacks, working from home and leveraging new tools has resulted in an explosion of new, decentralized employee passwords outside of the enterprise applications onboarded to your identity and privileged access management program. This shadow IT creates significant cybersecurity risk for your company with hundreds of employee passwords, secrets, and files shared in chats and texts, stored in spreadsheets, and saved on sticky notes. Or worse, passwords are reused across personal and corporate accounts on the internet.
Watch Now

Reduce API Security Risks with Automated and Continuous API Scanning

Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (PII), APIs have increasingly become a target for attackers leading to many serious data breaches in recent past. Gartner estimates that by 2022, API abuse will become the most-frequent attack vector, resulting in data breaches for many organizations.
Watch Now

Bug Bounties and How They Help

Trend Micro

Once a vulnerability becomes known to cybercriminals, the race is on for vendors to create a patch before it is exploited. And with the regular use of exploits in attacks and threats like the WannaCry ransomware using a vulnerability, getting the win has never been so crucial. This month we will cover the bug bounty marketplace, including the different types of markets available to vulnerability researchers. As well, we will review Trend Micro Research and how their research can benefit organizations through responsible disclosure and pre-disclosed filters to virtually patch vulnerabilities.
Watch Now

AI and Machine Learning: The Future of Cybersecurity in 2023

Join us for an exciting webinar on the cutting-edge technology of AI and machine learning, and how it is transforming the world of cybersecurity. Flare’s Head of Software Development Alexandre Viau, Data/AI Lead Francois Masson, and Director of Marketing Eric Clay will discuss the latest developments in the field, including the innovative GitHub Copilot and ChatGPT, as well as the vendors who are using AI to improve their cybersecurity capabilities. We will also delve into the growing threat of AI-powered attacks, and how organizations can stay ahead of these sophisticated adversaries.
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

resources