You searched for cyber | SC Media

Your search for cyber returned 20 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

WebCast remove
Last 3 months remove

Your search for cyber returned 20 results

Sort Results:

Relevant Recent
WebCast

Threat Hunting and Detection: Locating and isolating threat actors in your network

Threat Hunting and Detection: Locating and isolating threat actors in your network February 23 & 24, 2021 10:30 am – 4:00 pm EDT Many cybersecurity solutions leave security organizations playing a reactive cat-and-mouse game — one in which cybercriminals always seem to have the edge. Refining your threat hunting and detection capabilities is essential to shifting your strategy to a proactive stance.
WebCast

CISO cyber talk with Aflac: The importance of threat intelligence for mature security programs

ReversingLabs CEO, Mario Vuksan, sits down for a timely security discussion with Ben Murphy, a 20-year InfoSec veteran and U.S. CISO of Aflac, the largest provider of supplemental insurance in the United States. Together they discuss the importance of threat intelligence for mature security programs, and the need for dynamic and automated threat management for security effectiveness, especially in light of the COVID-19 crisis.
WebCast

Data Breach Response: Preparing for the inevitable security incident

Data Breach Response: Preparing for the inevitable security incident September 21-22, 2021 10:30 am – 4:00 pm EDT For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.
WebCast

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.
WebCast

Knowing your adversary: Mapping cyber kill chain indicators to security tactics

Knowing your adversary: Mapping cyber kill chain indicators to security tactics January 26-27 2021 10:30 am – 4:00 pm EDT Many — perhaps most — security professionals do not build their threat models around cyberespionage, but that approach is changing. Yes, state-sponsored hackers tend to go after bigger fish, but hackers-for-hire are leveraging the same tactics once used by state-sponsored APT groups to target smaller companies — especially as more small organizations increase their operations’ digital reach. Other bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with.
WebCast

Deconstructing the CRAE Index and What it Means to You

If you’d like to know what security pros are investing in and their insights into what’s working for them, our experts can help. The inaugural Cybersecurity Resource Allocation & Efficacy Index study from CyberRisk Alliance Business Intelligence, underwritten by Pulse Secure, launched last quarter and is about to be refreshed for the third quarter of 2020. It offers CISOs valuable information from companies, with 500 or more employees, in North America and Europe.
WebCast

Preventing the rise of island hopping and counter incident response

The pandemic, a distributed workforce, and the U.S. presidential election have created a perfect storm for cybercriminals. Security and IT teams must stay on top of day-to-day operations, while also addressing new sophisticated threat vectors like counter incident response and island hopping. Preventing, detecting, and responding to emerging threat techniques starts by understanding how cybercriminals are honing their ability to remain undetected inside organizations they’ve breached.
WebCast

The Future of Remote Work: Connecting Security and IT

CIOs, CISOs, and the teams they lead are constantly learning to adjust the operational and cybersecurity requirements of a remote workforce. And the stakes are high. Faced with the combined challenges of an expanding risk surface area, a disparate staff, and a complex set of tools and workflows, enterprise teams need help.
WebCast

Cybersecurity Strength in Numbers with Security Partners

Many cybersecurity teams struggle with overly complex and siloed toolsets. Powerful endpoint security technology combined with proven process and security expertise across endpoint, network, and cloud, is a winning formula to help you more effectively and efficiently identify and respond to cyber threats. Rather than build, maintain, and scale a security operations center alone, teaming up with trusted security partners gives you strength in numbers.
WebCast

Identity and Access Management: Rethinking your organization’s approach to insider threats

Identity and Access Management: Rethinking your organization’s approach to insider threats June 29-30, 2021 10:30 am – 4:00 pm EDT Insider threats are among the most difficult cyber risks to detect and prevent — and getting identity and access management (IAM) right is an essential step in keeping them at bay. The shift by many organizations to predominantly remote workforces has compounded the issue, with larger organizations especially vulnerable as the number of entry points to their networks has increased.