Why go halfway? What to insist on to get deeper security.

"How confident are you about your company’s network security? Most people do not know that their firewall is inadequate.

Let us show you how you could be in a better position to both understand your current level of preparedness for network attacks and improve areas where your protection measures may be weak"
Watch Now

Spotlight

GE Proprietary Information - The information contained in this document is General Electric Company (GE) proprietary information. It is the property of GE and shall not be used, disclosed to others or reproduced without the express written consent of GE, including, but without limitation, in the creation, manufacture, development, or derivation of any repairs, modifications, spare parts, or configuration changes or to obtain government or regulatory approval to do so, if consent is given for reproduction in whole or in part, this notice and the notice set forth on each page of this document shall appear in any such reproduction in whole or in part.


OTHER ON-DEMAND WEBINARS

The Top 3 Threats to Retail IT Security and How You Can Defend your Data

DUO

"This webcast explores: – New risks presented by cloud, mobile and Bring Your Own Device (BYOD) – Protecting data no matter where it lives, whether in the cloud or on-premises – The business and compliance drivers for strengthening authentication security The webcast is ideal for security, compliance and risk management officers; IT administrators; and other professionals concerned with information security in the retail industry."
Watch Now

Cyber security in life sciences – Webinar

KPMG

Watch a recording of our webinar held on 7 March 2018, which provides insights into how cyber security can impact life sciences organisations. In this webinar, KPMG Partners Caroline Rivett, Life Sciences Global Cyber Security Leader, and Stan Gallo, Australian leader for Forensic Technology and Cyber Incident Response Services shared their insights on the digitisation journey across the life sciences industry and tips on how to manage and mitigate cyber security risks in your organisation, including. outline of a patient's digital journey. The digital health ecosystem overview. Cyber security risk, management and outlook. Examples of malware attacks in healthcare and life sciences.
Watch Now

AV isn't Dead. It's Evolving.

Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
Watch Now

DevOps Security

Software Engineering Institute

In this presentation, Tim Palko and Chris Taschner explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices. The implementation of DevOps implies improvement across the entire scope of software delivery. However, as with any process change or introduction of new technology, lack of attention to security can invite disaster. In this presentation, we’ll explore some of the security-related topics and expectations that can be addressed when planning and changing your process to accommodate DevOps practices. Specific topics will include automation, monitoring, team collaboration, customer interaction, and also specific technologies such as Docker and Guantlt.
Watch Now

Spotlight

GE Proprietary Information - The information contained in this document is General Electric Company (GE) proprietary information. It is the property of GE and shall not be used, disclosed to others or reproduced without the express written consent of GE, including, but without limitation, in the creation, manufacture, development, or derivation of any repairs, modifications, spare parts, or configuration changes or to obtain government or regulatory approval to do so, if consent is given for reproduction in whole or in part, this notice and the notice set forth on each page of this document shall appear in any such reproduction in whole or in part.

resources