Cybersecurity Webcast Calendar

April
25
12:00 PM ET
Cybercast
It’s not rocket science, it’s network security. And yet for many organizations, the road to securing employees and information often results in trade-offs to performance, agility, scalable services, and user experience. While first-generation SASE solutions promised companies a way out of this complexity, those early deployments failed to resolve ...
More info
April
Cybercast
The unique characteristics of OT systems – legacy equipment, long lifecycles, and the convergence with IT networks – complicates deploying traditional security approaches. And these inherent weaknesses in OT environments create a low-hanging and potentially lucrative target for threat actors, making it critical that security teams take steps to en...
More info
May
Cybercast
By operating Records & Information Management (RIM) functions, data security and lifecycle management practices have been employed by organizations even before computing became the norm.  However, these practices are continually stretched to keep pace with new technologies, like AI, which can pose threats to data confidentiality and integr...
More info
Cybercast
AI is fundamentally changing how software is written. Developers are increasingly relying on code generated by leveraging generative AI tools and application security experts are scrambling to understand and mitigate security risks. To counteract this emerging threat, the developer community must take proactive measures and foster a culture of con...
More info
Cybercast
In this webcast, we unravel the insights and implications behind the latest global AI security guidelines, distilling complex recommendations into four key takeaways that every cybersecurity professional should know. As nations grapple with the rapid adoption of artificial intelligence, regulatory bodies worldwide have collaboratively devised comp...
More info
Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their organization’s defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will de...
More info
Cybercast
In today’s rapidly evolving threat landscape, enterprises face a daunting challenge: phishing attacks empowered by artificial intelligence (AI) and readily available phishing toolkits. Join this webinar to learn about the latest phishing trends, tactics, and predictions revealed in the Zscaler ThreatLabz 2024 Phishing Report. Experts from Th...
More info
Cybercast
The rapid expansion of digital capabilities has moved sensitive data into various ecosystems, creating additional risk and compliance concerns for organizations. In this panel discussion, security leaders share their approach to striking the right balance of protecting data while enabling information sharing and innovation.   The discussio...
More info
Live Event -
Connect with the brightest minds in the Identity Industry. Experience unparalleled education, collaboration, and insight into the future of Identity. Join us in Las Vegas at the end of May for a unique event experience and participate alongside experts and peers in information-rich sessions on the latest technologies, best practices, ...
More info
Cybercast
Identity and Access Management (IAM) solutions are no longer just ways to provide easy workforce access to applications, but critical tools in security and zero trust network access, creating the first line of defense against malicious actors and insider threats. In this panel discussion, experts from CyberRisk Alliance and CyberArk will shar...
More info
Cybercast
Cybersecurity tools, especially those experienced by end users, are often seen as blockers – built to create friction. We have been trained to believe that there must be a trade–off between security and user experience. If we are too strict users go around or just complain! Too lenient and we leave gaps for attackers to exploit. What if we b...
More info
Cybercast
As traditional security paradigms falter in the face of sophisticated cyber threats, zero trust emerges as a beacon of resilience. Join our expert panel for an in-depth exploration of the evolving landscape of zero trust, where strict identity verification is paramount, and the concept of assumed trust is fundamentally challenged. Gain valuable in...
More info
Cybercast
In the digital age, identity serves as both a shield and a sword in the realm of cybersecurity. Statistics reveal that 74% of breaches stem from the human element, highlighting the paradoxical nature of identity in the cyber era. This panel explores the interplay between social engineering and technological sophistication to detect these Identity ...
More info
Cybercast
Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefor...
More info
Cybercast
Managing the scope and complexity of third-party relationships can be a highly manual, time-consuming task for many security teams, and even after this effort effectively mitigating supply chain vulnerabilities remains one of the greatest threats to an organization’s security. In this panel discussion, security leaders share current approaches, ch...
More info
Cybercast
Zero trust concepts are often muddied by misconceptions and industry jargon that can stump even the most senior security practitioners. This webinar will untangle the intricate facets of zero trust to help organizations advance and optimize their programs. Talking points include: The biggest misconceptions around zero trust and how to gain a c...
More info
Cybercast
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Attend this webinar to learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives. Regist...
More info
Cybercast
Join us as we unravel the intricacies and innovations shaping the future of network security. In an era of unprecedented connectivity, emerging technologies, and evolving cyber threats, the landscape of network security is undergoing transformative changes. Our experts will explore the key trends, challenges, and strategies that will define the fu...
More info
Cybercast
AI presents both opportunities and challenges for security professionals and development teams. Snyk’s Edgar Kussberg will discuss the pitfalls AI can bring to secure development and will highlight key stats from Snyk’s recently released 2023 State of AI report to show how security teams can boost productivity while managing risk.Don’t...
More info
Cybercast
A Third-Party Risk Management Implementation Guide and ToolkitThird parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk...
More info
Cybercast
High-profile breaches continue to highlight the multiple risks to organizations from their supply chain. With increasingly interconnected third-party networks leading to even greater risk exposure, it is not surprising that supply chain security is a top priority for both regulators and organizations. It is undoubtedly time to evolve our approach ...
More info
Cybercast
The technology world in 2030 promises a landscape radically transformed by unprecedented advancements. As the cloud engulfs everything, organizations will grapple with ephemeral technology, a surge in regulations, and an unrelenting need for speed that most organizations aren’t ready for. This webinar explores the future of compliance and risk in ...
More info
Cybercast
Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI tools to help their company as well as define the acceptable risks and proper usage.  This panel discussi...
More info
Webcast
Join us for a brilliant webinar titled “Where Industry Ideas Come to Life,” led by Andrew Hindle, the Conference Chair for Identiverse. This engaging panel discussion will feature a lineup of seasoned industry experts, including Allan Foster, David Brossard (CTO at Axiomatics), and Gerry Gebel (Strata Identity), who will delve deep int...
More info
Cybercast
The cybercrime economy is thriving, driven by financially motivated bad actors who have established lucrative “dark” businesses in the light of day. Bad actors prioritize efficiency to maximize their illicit earnings, using bots for everything from buying up coveted concert tickets to draining bank accounts to even more sinister endeavors to human...
More info
Cybercast
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk and vendor due diligence! This webcast with Bill Brenner and Enterprise Security Weekly host Adrian Sanabria will walk through: Improving the vendor...
More info
Cybercast
Balancing tight security budgets with growing threats is challenging for resource-limited IT teams. Taking the right approach, even organizations with 50 – 2,000 employees can build resilient and effective cybersecurity. Learn proven methods for strengthening security from industry experts. Moderated by Bill Brenner of CyberRisk Allian...
More info
Cybercast
Security teams need more from their tools – full stop. Cyware’s Threat Intelligence Platform (TIP) goes beyond the traditional offerings, leveraging advanced threat intelligence automation, high-volume IOC ingestion, simplified tool integrations, and endless intel operationalization capabilities for a proactive cyber defense. This demo will div...
More info
Cybercast
Companies, universities, and government agencies are eager to employ AI technologies like ChatGPT and AI Assistants, like Microsoft Copilot, to improve productivity and analytical capabilities.  However, AI introduces risks to the organization like data compromise and biased or false outputs. More than ever, CISO leadership is needed to manag...
More info
Cybercast
New year. New risks. New priorities. Your personal resolutions may be defined, but your organization’s risk resolutions might be a bit more ambiguous. Do you start from scratch? Or continue to focus on unresolved issues from 2023? With continued budget cuts, growing third-party relationships, and disruptive technology (hint. hint. AI), secur...
More info
Cybercast
HTTPS is the gold standard for encrypting and protecting data on the web—yet almost 86% of cyberthreats hide in encrypted traffic, too. It’s a double-edged sword: even as encryption protects sensitive data, it’s a key means for threat actors to bypass defenses. With the bulk of malware, ransomware, and phishing attacks hidden in TLS/SSL, how can e...
More info
Cybercast
The embrace of SaaS and operating in multi-cloud environments creates an expansive and dynamic attack surface, making it difficult for security teams to maintain visibility into and understand risk levels. And with the protection of sensitive data now a shared responsibility between security teams and providers, CISOs have additional consideration...
More info
Cybercast
In this webcast, we dissect the lessons derived from ransomware attacks involving MOVEit, Doubledrive, and the MGM/Caesars breach—to empower organizations in fortifying their cybersecurity defenses. The session will commence with an in-depth analysis of the MOVEit ransomware attack, unraveling the tactics employed by threat actors to exploit vu...
More info
Cybercast
With the potential of cost savings, reduced operational complexities, and speed to market, many organizations are migrating from on-premises and third-party data centers to Cloud computing environments.  However, accompanying these “cloud first” strategies are many challenges that include protecting confidential data and operating new securit...
More info
Cybercast
With the complexity of modern applications and their reliance on third-party components, protecting our software supply chains is paramount. But without a holistic way to connect and contextualize risks within CI/CD pipelines and source control managers, siloed software supply chain security (SSCS) solutions can end up creating more noise than App...
More info
Cybercast
The frequency of data breaches and leaks in 2023 has surpassed cyber incidents from the past five years, highlighting the necessity for strong cybersecurity frameworks. In his discussion, Bart Falzarano, Head of Information Security at Bitwarden, will highlight the critical role of Zero Trust architecture in enhancing Identity Access Management (I...
More info
Cybercast
In today’s digital enterprises, identity-centered security is critical to reduce vulnerable attack surfaces, but implementation or rearchitecting efforts can be costly, burdensome to security teams, and create friction for users. In this panel discussion, CISOs share their IAM implementation and maturation best practices and lessons learned alo...
More info
Cybercast
A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their...
More info
Cybercast
The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation...
More info
Cybercast
In an era dominated by cloud computing, the landscape of network security is undergoing a paradigm shift, presenting both unprecedented challenges and opportunities. Join us for an insightful webcast as we delve into the dynamic realm of network security in the age of cloud computing. We’ll explore the multifaceted aspects of securing networks in ...
More info
Cybercast
In application security, recognizing threats is just the beginning. Real success requires choosing the right tools, adopting effective methodologies, and integrating security practices into development gates across the software development lifecycle — from “shift left” early-stage strategies to “shift right” monitoring post...
More info
Cybercast
Threat actors never stop working and employing new tools to hold your data hostage and take your business down. Attack vectors are often multifaceted and evasive. And the risk of reinjecting vulnerabilities, compromised accounts, and other attack artifacts back into your environment is a pervasive threat. Compared to previous data exfiltration att...
More info
Cybercast
The increased complexity of malicious actors’ techniques demand CISOs stay one step ahead of the threat landscape while still preparing for potential worst-case scenarios. Join this panel discussion to learn the steps CISOs can take to minimize the impact of a ransomware attack. The discussion explores: The latest adversarial trends a...
More info
Cybercast
Applications and software supply chains are constantly changing. So is the threat landscape. Vulnerabilities, misconfigurations, exposed secrets, design flaws, sensitive data exposure, etc., will always be inevitable. That’s why application security remains such a vibrant market and why application security teams have a host of tools (SAST, SCA...
More info
Cybercast
AppSec has long been considered a subset of IT security, but today’s threats make securing applications an imperative for the entire business. But how do you make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped one client on its journey to eff...
More info
Cybercast
Just because a business is mid-sized doesn’t mean the security risks it encounters are any smaller than those experienced by large enterprises. All organizations, regardless of size, face the same challenges around identity growth and management. A growth that places a greater burden on smaller organizations with limited resources that need to rem...
More info
Cybercast
The Reckoning is here for Traditional MFA, as it’s not enough for cyber insurance compliance. Did you know that the most popular methods of MFA (like OTP and push to email / text) are easily hacked and are grounds for higher premiums and non-renewals? Everyone knows that MFA provides better protection against hackers than just SSO and 2...
More info
Cybercast
A company’s data is its lifeblood and must be protected at all costs. But the larger the data pile, the harder it is to manage. Attackers know this and are on a nonstop hunt for holes in your tech stack to exploit. To have a fighting chance, organizations need to approach security as a team sport.In this SC webcast, host Bill Brenner sits down wit...
More info
Cybercast
The U.S. Securities and Exchange Commission’s highly-anticipated new cybersecurity rules are finally in force, and deadlines are approaching quickly. Organizations, both public and private, will now have to take quick action to either establish or transform their cybersecurity programs to come into compliance with these new regulations and prevent...
More info
Cybercast
The volume of identities in use by the average organization has skyrocketed over the past several years, and non-employee identities are no exception. A recent study conducted by McKinsey found that 36% of the U.S. workforce is now made up of contract, freelance, and temporary workers—up from 27% in 2016. In addition to contract workers, today’s b...
More info
Cybercast
Getting work done has gotten easier: instead of having to deal with on-premises applications, VPNs, and VDI, employees and contractors can now do most of their work using only a browser, whether they are working onsite, 100% remotely or in a hybrid environment.  But with the browser effectively becoming the workplace super app, enterpris...
More info
Cybercast
When Fortune 500 companies suffer a cyberattack resulting in a data breach, they go down hard. “For organizations to recover is like rightsizing the Titanic,” says Nick Essner, head of cyber solutions at CYGNVS. Essner has seen the damage up close, time and again, as an incident response leader for 15 years at companies like Accenture and Mandiant...
More info
Cybercast
Managing access for hundreds or even thousands of identities in disparate systems with manual processes is difficult, inefficient and – worst of all – risky. Traditional certification campaigns are flawed and time-consuming because certifiers lack the insights and automation needed to make accurate, forward-looking decisions. Companies need t...
More info
Democast
It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. Fortunately, these two goals don’t have to contradict each other – and one way to balance these two needs is to approach security from a dev point of view. This live demo wi...
More info
Cybercast
Open source code provides developers with the shortcuts they need to innovate and iterate faster. But due to a host of open source vulnerabilities, some shortcuts are safer than others. Metaphorically speaking, are your organization’s developers taking a well-lit, mapped-out shortcut, or straying down a mysterious, risky, and forebo...
More info
Cybercast
Cyber risk and business risk are increasingly one and the same, and it’s about time that business-minded executives understood that reality when managing their budgets and agendas. With cybercriminal activity showing no signs of slowing down, companies must understand that a commitment to mitigating cyber risk represents an investment in the busin...
More info
Cybercast
We’re hosting an eye-opening webinar aimed to help you take your digital security to the next level — all from the vantage point of security analysts dealing with threat intelligence, threat hunting, research, detection engineering and incident response.   In this session, Real-world Insights from a Sophos Threat Analyst, Sophos will dive ...
More info
Cybercast
As bad actors look to blur the lines between real and fake, cybersecurity experts need to stay one step ahead of tech-savvy fraudsters. A simple, yet robust set of fraud prevention practices is often the best approach for stopping fraudsters at the gate.In this impactful Q&A webcast, you will see through the lens of two expert solution enginee...
More info
Cybercast
Though red teaming is sometimes perceived as pen testing with the gloves off, in reality, the goal of these engagements isn’t to prove how much damage these skilled testers can do. Modern red teams must set out to provide learning opportunities for organizations and their blue teams, running attack simulations to help teach them how to better prot...
More info
Cybercast
For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, cloud infrastructure, and developer tools, is increasingly essential. But more often, tracking dependencies to fixing vulnerabilities can still be siloed because common tools and processes to create un...
More info
Cybercast
The threat landscape is in continuous motion. It’s constantly shifting and reshaping itself, and it’s up to security professionals to establish that they’re charting the changes, lest they find themselves falling behind in the never-ending race with cyber adversaries. In this webcast, PwC’s Global Threat Intelligence te...
More info
Cybercast
Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative.  Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data...
More info
Cybercast
Even cybersecurity pros struggle to address the unique challenges of Kubernetes and container security. It can be disorienting to take a career full of knowledge in more traditional platforms and apply it to the leading edge of declarative infrastructure and microservices. This webcast is designed to help security teams get over the initial cultur...
More info
Cybercast
Cyber threats are costing businesses more than you even realize. In a recent survey of 3,000 security and IT leaders, 55% of respondents said that dealing with cyberthreats has negatively impacted their IT team’s work on other projects, while 64% said that efforts to combat the latest threats were taking away valuable time and resources from mo...
More info
Cybercast
Getting AppSec Right: Traceability and Security from Code to Cloud    Organizations want to deliver secure applications quickly, but rapidly changing and increasingly complex development environments make it difficult to find, prioritize and fix application vulnerabilities. Further, when AppSec teams discover security issues, they lack e...
More info
Cybercast
The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations clamor for tools to uncover and stop cyber intrusions more quickly. They understand that when a bad actor penetrates their organization, every second counts. Many have learned this lesson the hard w...
More info
Cybercast
In the face of rising cybersecurity threats, cyber readiness continues to be an urgent matter for every organization. But how do you achieve it?  Cyber readiness ultimately involves answering three different questions, each related to a different aspect of cybersecurity. These questions are:  (Network understanding) What is the state...
More info
Cybercast
Developing applications and web experiences that meet the needs of the modern user is a robust challenge for any organization. Join Fastly’s Travis Sanders, Principal Global Technology Solution Architect, in his discussion of the value of one unified platform for application and website innovation. During this webinar, Travis and Brock will highli...
More info
Cybercast
As adoption of software-as-a-service (SaaS) applications skyrockets, cybercriminals understand that the cloud has become a go-to vector for them to illegally access and compromise your data. Through phishing scams, exploits and abuse of misconfigurations, adversaries can steal, modify, encrypt or wipe your valuable SaaS-based assets – resulting...
More info
Cybercast
Join this webcast to learn about the findings from the 2023 State of Passwordless Security report and how you can use it to improve your organization’s security posture. CRA VP of Content Strategy Bill Brenner, Bojan Simic, HYPR’s Co-founder, CEO and CTO and  Andrew Shikiar, Executive Director & CMO, FIDO Alliance discuss key tak...
More info