Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls

Fortinet

No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.
Watch Now

Spotlight

To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection.


OTHER ON-DEMAND WEBINARS

Secure Web Development Bootcamp: SDLC Fundamentals in 60 Minutes

This condensed, one-hour secure development webinar provides you with an instructor-led Secure Web Development Bootcamp training that will help your team better understand how to build secure websites. This session gets participants up-to-speed on the state of application security today by tying together current headlines to secure coding practices and principles. Demonstrations and re-enactments highlight how attackers take advantage of common web vulnerabilities.
Watch Now

An Elegant and Practical Model for Security Practitioners

FireEye

Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
Watch Now

Cybersecurity: Before, During and After a Breach

Today, 80% of corporate assets are likely virtual, dramatically increasing the risk of cybercrime. In this webinar you will learn how business continuity professionals can prepare for the possibility, mitigation and follow up in the case of a cyber breach.The webinar will focus on providing essential, accurate, and timely information to stakeholders before, during, and after a breach. You’ll learn to identify and prioritize your target audiences, and engage the proper channels of communications for effective internal and external communications. You’ll find out why it’s important that response evolves beyond traditional communication outlets, like press releases and conferences, to new communications venues like social media, Internet, intranet, email, text messaging, mass notification, and toll-free lines.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now

Spotlight

To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection.

resources