You searched for cyber | SC Media

Your search for cyber returned 21 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove
okirilyuk remove

Your search for cyber returned 21 results

Sort Results:

Relevant Recent
WebCast

How to Enhance Your Cyber Defense Program

Knowing which threats you face and how to counter them is just the beginning of developing your cyber defense program. Organizations need to keep track of their programs and ensure that the solutions they applied are working. Join the Center for Internet Security (CIS), a community-driven nonprofit, for a deep dive into CIS SecureSuite®. Learn how becoming a member can deliver the right tools and resources can help you enhance your cyber defense program.
SC Virtual Conference
WebCast

Threat Hunting and Detection: Locating and isolating threat actors in your network

Threat Hunting and Detection: Locating and isolating threat actors in your network February 23 & 24, 2021 10:30 am – 4:00 pm EDT Many cybersecurity solutions leave security organizations playing a reactive cat-and-mouse game — one in which cybercriminals always seem to have the edge. Refining your threat hunting and detection capabilities is essential to shifting your strategy to a proactive stance.
WebCast

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.
WebCast

CISO cyber talk with Aflac: The importance of threat intelligence for mature security programs

ReversingLabs CEO, Mario Vuksan, sits down for a timely security discussion with Ben Murphy, a 20-year InfoSec veteran and U.S. CISO of Aflac, the largest provider of supplemental insurance in the United States. Together they discuss the importance of threat intelligence for mature security programs, and the need for dynamic and automated threat management for security effectiveness, especially in light of the COVID-19 crisis.
WebCast

Deconstructing the CRAE Index and What it Means to You

If you’d like to know what security pros are investing in and their insights into what’s working for them, our experts can help. The inaugural Cybersecurity Resource Allocation & Efficacy Index study from CyberRisk Alliance Business Intelligence, underwritten by Pulse Secure, launched last quarter and is about to be refreshed for the third quarter of 2020. It offers CISOs valuable information from companies, with 500 or more employees, in North America and Europe.
SC Virtual Conference
WebCast

Knowing your adversary: Mapping cyber kill chain indicators to security tactics

Knowing your adversary: Mapping cyber kill chain indicators to security tactics January 26-27 2021 10:30 am – 4:00 pm EDT Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.
WebCast

Preventing the rise of island hopping and counter incident response

The pandemic, a distributed workforce, and the U.S. presidential election have created a perfect storm for cybercriminals. Security and IT teams must stay on top of day-to-day operations, while also addressing new sophisticated threat vectors like counter incident response and island hopping. Preventing, detecting, and responding to emerging threat techniques starts by understanding how cybercriminals are honing their ability to remain undetected inside organizations they’ve breached.
SC Virtual Conference
WebCast

Data Breach Response: Preparing for the inevitable security incident

Data Breach Response: Preparing for the inevitable security incident September 21-22, 2021 10:30 am – 4:00 pm EDT For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.
WebCast

The Future of Remote Work: Connecting Security and IT

CIOs, CISOs, and the teams they lead are constantly learning to adjust the operational and cybersecurity requirements of a remote workforce. And the stakes are high. Faced with the combined challenges of an expanding risk surface area, a disparate staff, and a complex set of tools and workflows, enterprise teams need help.
WebCast

Cybersecurity Strength in Numbers with Security Partners

Many cybersecurity teams struggle with overly complex and siloed toolsets. Powerful endpoint security technology combined with proven process and security expertise across endpoint, network, and cloud, is a winning formula to help you more effectively and efficiently identify and respond to cyber threats. Rather than build, maintain, and scale a security operations center alone, teaming up with trusted security partners gives you strength in numbers.