Windows XP: A Feast for Cyber Attackers?

"Get to know the impact of legacy systems on the security in the organisations.

Come April 2014, Microsoft will stop releasing patches and bug fixes for Windows XP—which means the operating system will be more vulnerable to security risks and viruses. For organisations not ready to move away from Windows XP, there are key questions and implications they have to face:

1.How will Windows XP hold up against cyber-attacks and viruses
2.How much more vulnerable will the Windows XP systems be?
3.Should organizations be worried if there are only a small group Windows XP installations?
4.What if the other security controls are tight?

Join us to understand these issues at our live webinar ""Windows XP: A Feast for Cyber Attackers?"" 
Watch Now

Spotlight

Assessing Nine Years of Cyber Security Vulnerabilities and Exploits Disclosures of significant cyber security breaches have become routine as organizations increasingly rely on vulnerable digital technologies and third-party service providers. Protiviti’s 2018 Security Threat Report aims to help organizations address and understand the cyber security landscape by exploring and detailing the most common digital threats today. Key calls to action: Strong permission and user access controls. Employee security awareness. Patch management. System configuration management. Periodic penetration testing.


OTHER ON-DEMAND WEBINARS

Hackers and Threats: Cybercrime Syndicates Go Global

ISF Ltd

Organisations around the globe are struggling to cope with the quantum speed and sophistication of attacks by organised cyber criminal syndicates and going forward will need to prepare to be targeted 24x7 by multiple assailants. Criminal organisations have become more sophisticated, mature and are migrating their activities online at greater pace. They have begun to develop complex hierarchies, partnerships and collaborations that mimic large private sector organisations and are taking their activities global. Organisations that wish to keep pace with these developments and remain financially viable will need to take action now.
Watch Now

Hacking Hospitals

Symantec

Patient health is at grave risk in the current digital era, as sophisticated adversaries utilize technology to perform digital attacks that can result in physical harm. While Healthcare IT typically prioritizes protecting patient records (PHI), this omits the crucial overall healthcare mission of championing patient health against possible attacks against the healthcare digital ecosystem. This webinar will present and analyze real world attack scenarios against the healthcare ecosystem, the mindset of hackers, and the complexity of constraints facing health IT security.
Watch Now

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Addressing Challenges in Securing the Software Defined Data Center

"Data center security is being reshaped by virtualisation, consolidation, and promising new technologies such as Software Defined Networking (SDN). The adoption of the SDDC brings new challenges such as inspecting East-West traffic without the need to compromise on all the benefits of today's physical appliances"
Watch Now

Spotlight

Assessing Nine Years of Cyber Security Vulnerabilities and Exploits Disclosures of significant cyber security breaches have become routine as organizations increasingly rely on vulnerable digital technologies and third-party service providers. Protiviti’s 2018 Security Threat Report aims to help organizations address and understand the cyber security landscape by exploring and detailing the most common digital threats today. Key calls to action: Strong permission and user access controls. Employee security awareness. Patch management. System configuration management. Periodic penetration testing.

resources