Winning the Zero Trust Race with Micro-Segmentation

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data. Originally conceived in 2010, the zero trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption. However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

MDR, Not XDR or EDR: Untangling the Alphabet Soup of Cybersecurity

As we all know too well, 2020 and 2021 have been full of adaptations. While many employees adjust to working remotely, IT and security professionals everywhere must work overtime to secure and manage their company’s network core infrastructure.
Watch Now

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019

Mithi

In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Watch Now

Endpoint Security Got You Down? No PowerShell? No Problem

Black Hills Information Security

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way! We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now

Managing Cyber Security Risks

Ever wonder how businesses get exposed to cyber-attacks like ransomware, phishing, social engineering scams, and more? Is your organization vulnerable to these threats? If you are uncertain about the vulnerabilities in your business that could lead to a major loss in productivity, revenue… or worse… attend this webinar and learn how to identify risk factors and bolster your organization’s defenses.
Watch Now