Why Security Awareness Should Not Stop at Phishing

Mediapro

If you’re keeping even half an eye on the InfoSec news cycle, you know how big of a problem phishing is. The annual Verizon data breach found again this year that phishing was the leading way for malware to enter networks, with the average company reporting that 94% of detected malware came in via email. Thirty-two percent of confirmed breaches started with phishing, again the most common tactic. It makes sense, then, that so much security awareness content out there is focused on this threat. Some vendors make their business on it almost completely, with this trend extending to the phishing simulator emerging as a key selling point for those in the security awareness business.
Watch Now

Spotlight

"Health care organizations are challenged to protect patient data and comply with regulations governing health care entities. Having well-documented policies and controls, along with expert recommendations, are in an important part of reducing risk and achieving compliance with the Health Insurance Portability and Accountability Act (HIPAA).
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures."

OTHER ON-DEMAND WEBINARS

Bringing New Meaning to Extended Detection and Response

For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).
Watch Now

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies

IBM

Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential information across hybrid and multi-cloud environments can overwhelm even the savviest of security and IT teams, especially when resources are scarce. However, data security defenses don’t have to be costly or overly complex to carry out.
Watch Now

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need

Sentryo

You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now

Best Practices for Assessing Cyber Vulnerabilities

Tenable

Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimated nearly 19,000 new vulnerabilities would be disclosed. There are just too many to discover, assess and effectively mitigate. Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Bill Olson, Technical Director with Tenable, for an on-demand webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.
Watch Now

Spotlight

"Health care organizations are challenged to protect patient data and comply with regulations governing health care entities. Having well-documented policies and controls, along with expert recommendations, are in an important part of reducing risk and achieving compliance with the Health Insurance Portability and Accountability Act (HIPAA).
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures."

resources