You searched for cyber | SC Media

Your search for cyber returned 124 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove

Your search for cyber returned 124 results

Sort Results:

Relevant Recent

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.

Building a Better Identity Management Roadmap

The way organizations operate and process information has drastically changed over the last six months as the global economic and health crisis has resulted in job losses, an expanded remote workforce, and increased use of temporary staff. One important byproduct of this shift: Security leaders are rethinking their approaches to access control. Even in the best of circumstances, ensuring effective oversight of digital identities is among a security leader’s most daunting responsibilities. Innovations in contextual and biometric authentication remain promising — though the latter must confront increased social and legal resistance — but the growing complexity of internal and external networks we rely on keeps the bar high.

AppSec managers are becoming extinct. Get ready to embrace DevSecOps

Security expert Dr. Matias Madou, Ph.D. will demonstrate the changes the industry has faced in the journey from Waterfall to DevSecOps, as well as reveal how AppSec and security awareness professionals can become a powerful piece of the DevSecOps pipeline, nurturing an effective dream team that fights back against cyberattacks and the common vulnerabilities that cause them.

Is your incident response plan what it needs to be?

Join us August 19-20 to hear from incident-response experts and network with other security professionals who can share real-world experiences on what’s worked and what hasn’t. With cyber threats continuously looming, there is a good chance you’ll have an incident to respond to in your future. Taking a proactive stance is essential. Register today.

Cyber crisis simulation: You’re in control

This webinar will throw attendees into an emerging breach simulation. Delegates will be collectively in control of how a fictional company reacts to technical, business, and risk challenges in near real-time, making decisions using their mobile devices in response to the evolving scenario. The elements of this scenario will use examples from recent breaches and highlight potential missteps made by those organizations. 

Proactive Cyber Defenses

Companies also are being more aggressive about ensuring their supply chains are safe and using threat intelligence to reduce the number of known attack vulnerabilities. What are you doing to protect your network in advance, and how do you sell these proactive programs to your C-Suite

Design Thinking for Zero Trust

Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet?
Next hm-webcast in Website/Web Server Security