SC Media webcasts | IT Security

Webcasts

UPCOMING WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
20/20 webcast

Managing the attack surface

We talk a lot about finding ways to defend our networks from attacks. One of the most effective defenses against cyberattacks is the same used against physical attacks: Don’t be there. Today’s 20/20 webcast looks at ways companies can manage and reduce their attack surface so that they present a smaller target to the attackers, as well as tactics defenders can use long-term to continue to present a smaller target.

Register for Managing the attack surface

Sponsored by: Netenrich

Managing the attack surface

We talk a lot about finding ways to defend our networks from attacks. One of the most effective defenses against cyberattacks is the same used against physical attacks: Don’t be there. Today’s 20/20 webcast looks at ways companies can manage and reduce their attack surface so that they present a smaller target to the attackers, as well as tactics defenders can use long-term to continue to present a smaller target.

20/20 webcast

Identity Crisis: Solved?

We talk a lot about how passwords are obsolete, easy to breach, and generally just an obsolete technology that should be replaced. Yet many companies are hesitant to engage in emerging identity management technology because of the costs, the complexity of replacing one identity access management approach with another, and the challenge of layering on new IAM without breaking existing identity products — the management can be a monumental challenge.

Register for Identity Crisis: Solved?

Sponsored by: OneLogin

Identity Crisis: Solved?

We talk a lot about how passwords are obsolete, easy to breach, and generally just an obsolete technology that should be replaced. Yet many companies are hesitant to engage in emerging identity management technology because of the costs, the complexity of replacing one identity access management approach with another, and the challenge of layering on new IAM without breaking existing identity products — the management can be a monumental challenge. Today’s users might be local or remote using a variety of devices, the might be connecting to the corporate network or the cloud, and in some cases, the “user” is an automated system or service account that has a minimal amount of actual human interaction. The assets connecting to the network can be physical or virtual, and in some cases might exist only for a very short time before being decommissioned. In short, this is not the identity management environment of just a couple of years ago. This webcast looks at the future of identity management — alternatives to passwords such as biometrics, AI, multifactor authentication and more — and looks at how CISOs can make sense of this rapidly evolving landscape.

20/20 webcast

The Future of Remote Work: Connecting Security and IT

CIOs, CISOs, and the teams they lead are constantly learning to adjust the operational and cybersecurity requirements of a remote workforce. And the stakes are high. Faced with the combined challenges of an expanding risk surface area, a disparate staff, and a complex set of tools and workflows, enterprise teams need help.

Register for The Future of Remote Work: Connecting Security and IT

Sponsored by: VMWare

The Future of Remote Work: Connecting Security and IT

CIOs, CISOs, and the teams they lead are constantly learning to adjust the operational and cybersecurity requirements of a remote workforce. And the stakes are high. Faced with the combined challenges of an expanding risk surface area, a disparate staff, and a complex set of tools and workflows, enterprise teams need help.

Traditionally, security and IT teams have relied on a distinct set of tools to provision, manage, and monitor remote employee access to endpoints, apps, and other systems they need to do their jobs. Even though security and IT teams share a common set of goals, the lack of a shared toolset impedes their ability to gain collective progress.

As detailed in our eBook, distributed workforces may become the norm for most enterprises. Join us for this webinar as VMware Chief Operating Officer Sanjay Poonen and our security experts unpack:

-How a cloud-native and intrinsic security approach unifies security and IT management across all control points in an organization: endpoints, workloads, clouds, networks, and identity

-Remote workforce risks and rewards: understanding and addressing the three most common risk scenarios that might impact your remote employees

-The latest threat vectors targeted specifically at remote workforces, including ransomware, phishing attacks, botnets, and fake appsand other systems they need to do their jobs. Even though security and IT teams share a common set of goals, the lack of a shared toolset impedes their ability to gain collective progress.

20/20 webcast

Time Travel, Cybersecurity, & Asset Management: What the Past & Future Can Teach Us Today

Predicting the future is hard. If 2020 is any proof, everyone who was asked in 2015, “Where will you be in five years?” got that question wrong. But if we want to understand how to get ahead of the cybersecurity challenges of 2030, there’s a perfectly rational place to start: asset management. Not only where we are today with asset management, but how the past got us to this point, too.

Register for Time Travel, Cybersecurity, & Asset Management: What the Past & Future Can Teach Us Today

Sponsored by: Axonius

Time Travel, Cybersecurity, & Asset Management: What the Past & Future Can Teach Us Today

Predicting the future is hard. If 2020 is any proof, everyone who was asked in 2015, “Where will you be in five years?” got that question wrong. But if we want to understand how to get ahead of the cybersecurity challenges of 2030, there’s a perfectly rational place to start: asset management. Not only where we are today with asset management, but how the past got us to this point, too.

Join us for “Time Travel, Cybersecurity, & Asset Management: What the Past & Future Can Teach Us Today” a free webinar hosted by Nathan Burke, CMO at Axonius, on October 6 at 2:00 pm ET. Nathan will take you on a trip through time to uncover how understanding the past — including understanding the intersection of devices, cloud instance, users, and solutions — dictates how we approach cybersecurity challenges today and in the future.

RSVP now to learn:
• The device management trends of the past that created today’s cybersecurity challenges
• How today’s rapid cloud adoption creates a coverage mismatch using tools meant for the past
• What past and present asset management trends can teach us about the future of IoT and ephemeral devices, and how to get ahead of the coming cybersecurity challenges

20/20 webcast

Early this year the research firm Enterprise Strategy Group conducted a study that shows the percentage of companies that have incorporated security into their DevOps process more than doubled in the past two years.The pandemic has accelerated digital transformation initiatives at many companies, and updating security models for the modern cloud native stack is causing more than just ripples in the industry among the various stakeholders. Senior management, CISOs and CIOs, developers, IT operations, architects and many others within organizations are now rethinking security tooling to maintain security in a faster-moving pipeline.

Register for

Sponsored by: Aqua Security

Early this year the research firm Enterprise Strategy Group conducted a study that shows the percentage of companies that have incorporated security into their DevOps process more than doubled in the past two years.

The pandemic has accelerated digital transformation initiatives at many companies, and updating security models for the modern cloud native stack is causing more than just ripples in the industry among the various stakeholders. Senior management, CISOs and CIOs, developers, IT operations, architects and many others within organizations are now rethinking security tooling to maintain security in a faster-moving pipeline.

As a result, the challenges of what security means for cloud native environments has gone from nice-to-know to essential-to-know. Today’s 20/20 webcast looks at how this transition to cloud-native applications is being made, what it means for these companies that are trying to get their arms around the various technologies, and what these stakeholders need to know going forward to ensure they are taking full advantage of the opportunity for improved security, and not simply creating new problems for themselves.

20/20 webcast

Small businesses deserve big protection

Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. In this webinar, you’ll learn more about small business cybersecurity and why DNS protection makes a difference.

Register for Small businesses deserve big protection

Sponsored by: Cisco

Small businesses deserve big protection

Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. In this webinar, you’ll learn more about small business cybersecurity and why DNS protection makes a difference.

Join us on Thursday, October 19, 2020 at 11 a.m. PT | 2 p.m. ET. You’ll learn how to getpowerful protection against today’s biggest threats with Cisco Umbrella, a cloud-delivered security service that is simple and cost-effective for a team of any size to deploy, use, and manage, with no hardware to maintain or upgrade.

Umbrella protects your users wherever they choose to work and speeds up your detection and incident response times, letting you focus on more important things (like running your business!)

Sign up today. We look forward to connecting with you.

20/20 webcast

Securing Employees Email

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users’ mailboxes. This 20/20 webcast and special report looks at secure email gateways and secure web gateways, identifying their vulnerabilities and how these legacy products remain relevant.

Register for Securing Employees Email

Sponsored by: Cofense

Securing Employees Email

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users’ mailboxes. This 20/20 webcast and special report looks at secure email gateways and secure web gateways, identifying their vulnerabilities and how these legacy products remain relevant.

ON-DEMAND WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
20/20 webcast

5 Ways to Mitigate Costly Software Supply Chain Attacks to Get Your SDLC in Check

Developing your digital business means developing new web and mobile applications, migrating to cloud, and evolving DevSecOps practices to accelerate time to market. Yet cyberattackers have aggressively been targeting your software supply chain, including open-source repositories, to act as malware distribution platforms. With today’s software more reliant on third-party and open-source software, your software development lifecycle (SDLC) demands more checks to validate the integrity of your build, release and production software.

Register for 5 Ways to Mitigate Costly Software Supply Chain Attacks to Get Your SDLC in Check

Sponsored by: ReversingLabs

5 Ways to Mitigate Costly Software Supply Chain Attacks to Get Your SDLC in Check

Developing your digital business means developing new web and mobile applications, migrating to cloud, and evolving DevSecOps practices to accelerate time to market. Yet cyberattackers have aggressively been targeting your software supply chain, including open-source repositories, to act as malware distribution platforms. With today’s software more reliant on third-party and open-source software, your software development lifecycle (SDLC) demands more checks to validate the integrity of your build, release and production software.

In this session, we’ll discuss:

• How to secure your supply chain with rapid analysis, authoritative file intelligence, and increased threat visibility.
• How to integrate security monitoring and Application Lifecycle Security into your SDLC
• How to leverage CVE data against a list of IOCs to proactively prioritize patches and fixes
• How to apply tools like YARA to retroactively scan for your risks across your release history.

20/20 webcast

Making Customer-focused Identity Simple

Connecting outsiders to a corporate network today is more problematic than ever, and it’s more than just employees working from home. Consumer-to-business accounts, such as customers logging in to make a purchase or reviewing their medical charts, or business-to-business portals in order to collaborate and service accounts, are being stressed at a much greater level today. We’ve all seen the chaos that can occur when companies that manage managing millions of user accounts, such as an entertainment channel, are breached and private data revealed.

Register for Making Customer-focused Identity Simple

Sponsored by: Auth0

Making Customer-focused Identity Simple

Connecting outsiders to a corporate network today is more problematic than ever, and it’s more than just employees working from home. Consumer-to-business accounts, such as customers logging in to make a purchase or reviewing their medical charts, or business-to-business portals in order to collaborate and service accounts, are being stressed at a much greater level today. We’ve all seen the chaos that can occur when companies that manage managing millions of user accounts, such as an entertainment channel, are breached and private data revealed. Today identity management is more important than ever, relying on adaptive access control, customer lifecycle management, market segmentation and privacy. This webcast looks at how building security directly into applications, combined with simplifying the user experience and protecting the customers’ privacy, takes identity management and authentication to the next level.

20/20 webcast

Run a secure development program

Most of your application code is open source, and you’re relying on containers for running your applications – but are you managing to keep up with security? Learn how Snyk enables developers to find, prioritize and fix vulnerabilities and license issues in open source dependencies and containers.

Register for Run a secure development program

Sponsored by: Snyk

Run a secure development program

Most of your application code is open source, and you’re relying on containers for running your applications – but are you managing to keep up with security? Learn how Snyk enables developers to find, prioritize and fix vulnerabilities and license issues in open source dependencies and containers.

20/20 webcast

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

Register for The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

Sponsored by: KnowBe4

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about.

He’ll show you:
• The two best questions to ask to prevent malware and ransomware
• The most common ways malware gets around your defenses
• A live malware demonstration and how you can prevent it immediately
• Step-by-step action plans you can start implement now
• How to enable your end users to become your best, last line of defense

Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.

20/20 webcast

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.

Register for New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

Sponsored by: TrapX

New Normal, New Risk: What Global Security Pros are Saying About the Challenges of Securing Remote Workers

The COVID-19 pandemic dramatically accelerated the growth of remote workers across all industries. As companies struggle to adjust to our new “work from anywhere” reality, security staff are caught in the crossfire. Remote teams are required for business continuity, yet these employees and their devices create an exponentially broader attack surface area, as well as significant risk to the organization.

In this live webinar, we’ll debut the results of a new global survey from Osterman Research exploring the impact of the remote work explosion on cyber security teams, their readiness to protect employees and their devices both pre-and post-pandemic, and how these new levels of risk are driving shifts in security strategy, technology investments, and spending.

We’ll also discuss how easy-to-deploy cyber-defense solutions, like Deception, can proactively mitigate WFA risk ahead of a security team’s ability to implement traditional controls, while providing an early warning system for potential threats.

DemoCast webcast

How to get workload-level security for AWS, Azure, and GCP — without agents

Cloud security deserves better. With no on-prem environments to protect, Orca was free to create a cloud-native security platform without the constraints of agents and network scanners.

Register for How to get workload-level security for AWS, Azure, and GCP — without agents

Sponsored by: Orca

How to get workload-level security for AWS, Azure, and GCP — without agents

Are you using agents, network scanners, or CSPM tools to detect risks across your public cloud estate? Sorry, you’re doing it wrong.

Cloud security deserves better. With no on-prem environments to protect, Orca was free to create a cloud-native security platform without the constraints of agents and network scanners.

Delivered as SaaS, Orca’s SideScanning™ technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you workload-level security across AWS, Azure, and GCP, without the gaps in coverage and operational costs of agents.

  • Orca’s 5-minute onboarding process
  • The power of addressing both the control plane and data plane at once
  • The scanning process for vulnerabilities, misconfigurations, malware, lateral movement risk, exploitable keys, weak passwords, and unsecured sensitive data
  • How Orca prioritizes risk based on environmental context

DemoCast webcast

Building an effective cyber training program for your cyber-pros

This presentation will focus on cutting edge training technologies and strategies for security team managers and cyber-pros that will help to overcome limited budgets and time, as well as train in place requirements.

Register for Building an effective cyber training program for your cyber-pros

Sponsored by: RangeForce

Building an effective cyber training program for your cyber-pros

In the cybersecurity triad of people, process, and technology, much time and money is spent on technology and very little on people or process. Even today, as security awareness training matures for end users, security leaders have few choices when it comes to effectively and affordably training their cyber pros. Certificate programs are designed for individuals and not for teams, and the skills learned are quickly lost if not used in a cyber-pros day to day job as no practice environment exists to hone skills. The final straw is the forced move to an “at home work environment” completely disrupting traditional onsite training.

This presentation will focus on cutting edge training technologies and strategies for security team managers and cyber-pros that will help to overcome limited budgets and time, as well as train in place requirements. In this presentation, the audience will learn about the latest advances in interactive computer based training, advanced simulation, and cyber range exercises so that managers and cyber pros can find effective methods to affordably develop and hone their team’s cyber skills. 

20/20 webcast

Cloud security: Making your managed detection and response effective

This 20/20 looks at how managed network detection and response can help ensure that only authorized users are accessing your data and that potential breaches are identified quickly and managed immediately.

Register for Cloud security: Making your managed detection and response effective

Sponsored by: Rapid7

Cloud security: Making your managed detection and response effective

Your data is now in the cloud. Do you know for absolute certain that the only people accessing this data are authorized to do so? There is often confusion amongst non-security staff and management about what responsibility you as the company has to manage and detect threats on the cloud and what is the responsibility of the service provider. Considering that companies do not have physical access to cloud-based servers, CISOs need to make sure they have the capability to do threat hunting on their cloud assets and that their service providers also are doing their share of the work to ensure your data is protected.

This 20/20 looks at how managed network detection and response can help ensure that only authorized users are accessing your data and that potential breaches are identified quickly and managed immediately.

We’ll be discussing:

  • What are some of the new issues CISOs are facing with this new work-from-home environment? 
  • How does this change the way they protect their cloud-based data and what are some options they have to employ perhaps different technologies to assist them?
  • What can companies do to ensure that their cloud-based data is secure on public clouds?
  • Do CISOs need to backfill their vetting of whatever cloud service they selected earlier this year to meet the immediate need to move to a remote user workforce or should they simply go from here to try and implement MDR based on what they perhaps already had been using? 

Vendor Webcast

AppSec managers are becoming extinct. Get ready to embrace DevSecOps

Security expert Dr. Matias Madou, Ph.D. will demonstrate the changes the industry has faced in the journey from Waterfall to DevSecOps, as well as reveal how AppSec and security awareness professionals can become a powerful piece of the DevSecOps pipeline, nurturing an effective dream team that fights back against cyberattacks and the common vulnerabilities that cause them.

Register for AppSec managers are becoming extinct. Get ready to embrace DevSecOps

Sponsored by: SecureCodeWarrior

AppSec managers are becoming extinct. Get ready to embrace DevSecOps

For many years, AppSec managers have had the unenviable task of coordinating, overseeing and working on the security programs of organizations large and small. They are in-house security specialists, and becoming rarer than gold. There are simply not enough of them to go around, yet the risk of cyberattacks is greater than ever. 

They are usually under-resourced, overworked, and misunderstood by the development team, who see security as somewhat of a hindrance to their feature-building innovation. It’s dysfunctional, to say the least.

Fast-forward to today, and it’s becoming apparent that we are not keeping up with the security demand of an increasing supply of code, and “AppSec” best practices are fast becoming outdated. The idea of the general AppSec manager is becoming ancient history, and for good reason: it’s time for DevSecOps to get some serious organizational traction, and take the pressure off them while reducing cyber risk.

DevSecOps creates an environment of shared responsibility for security, where developers become responsible for effective deployment, and the lines between AppSec and development teams are increasingly blurred and more collaborative.  

The days of a hands-off security approach for developers are over, and with the right training and tools, they can take advantage of this process, upskill and stand out among their peers… however, they need the security specialists on-side, factoring them into securing code from the start and championing this mindset across the company.

Security expert Dr. Matias Madou, Ph.D. will demonstrate the changes the industry has faced in the journey from Waterfall to DevSecOps, as well as reveal how AppSec and security awareness professionals can become a powerful piece of the DevSecOps pipeline, nurturing an effective dream team that fights back against cyberattacks and the common vulnerabilities that cause them.

Vendor Webcast

New ESG research: Say goodbye to threats, network complexity, and inefficiency

Register today to learn why 90% of organizations are fed up with managing multiple tools and are looking to migrate security to the cloud during their next hardware refresh cycle.

Register for New ESG research: Say goodbye to threats, network complexity, and inefficiency

Sponsored by: Cisco

New ESG research: Say goodbye to threats, network complexity, and inefficiency

Threats, network complexity, and inefficient tools — all of these factors drive the need for a new approach to network security. With more mobile devices, more cloud access, and a wide assortment of point tools, it’s hard for organizations to get a handle on threats and respond quickly. 

If you’re frustrated with endless alerts and inconsistent policy enforcement, you might wonder if there’s a more efficient way to secure users.  

Register today to learn why 90% of organizations are fed up with managing multiple tools and are looking to migrate security to the cloud during their next hardware refresh cycle.

DemoCast webcast

Analyst1: Intelligent cyber threat response

Join Analyst1 founder and chief product officer, Scott Messick, to understand how to enable analysts to better research malicious activity and help accelerate the time to response and mitigation.

Register for Analyst1: Intelligent cyber threat response

Sponsored by: Analyst 1

Analyst1: Intelligent cyber threat response

Cybersecurity professionals know there are fundamental gaps in most cyber operations centers, one of which is the overwhelming level of effort required to understand cyber threat information. As a result, cyber analysts are rarely allowed to produce their primary work product: actionable intelligence. The operative descriptor is actionable, holistic intelligence delivered to the right people at the right time to make informed actions to protect their networks. Analyst1 bridges the gap between threat information and actionable intelligence.

Join Analyst1 founder and chief product officer, Scott Messick, to understand how to enable analysts to better research malicious activity and help accelerate the time to response and mitigation.

Vendor Webcast

Privileged access cloud security: Insider tips and best practices

Join Thycotic’s Nick Hunter as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also give you a brief demonstration of how Thycotic’s new access control solutions can safeguard cloud access by both IT and business users.

Register for Privileged access cloud security: Insider tips and best practices

Sponsored by: Thycotic

Privileged access cloud security: Insider tips and best practices

As the adoption of cloud applications and services accelerates, organizations worldwide must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors.  Privileged Access Management (PAM) is an important part of IT security for two main reasons. First, it’s absolutely critical to maintaining a strong security posture. Without some systematic management of privileged users, it’s nearly impossible to ensure that anything else will be secure. Secondly, PAM is hard to do – at least, it’s hard for organizations that lack a dedicated PAM solution.

Are your current privileged access management efforts enough? 

Join Thycotic’s Nick Hunter as he explains a practical approach to help you define and implement privileged access cloud security best practices and strategies. He will also give you a brief demonstration of how Thycotic’s new access control solutions can safeguard cloud access by both IT and business users.

With compromised credentials accounting for 77% of cloud breaches, Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. As organizations utilize the cloud to enable remote work and accelerate digital transformation, there is a need to understand where potential security risks exist and address them head on.  Attend this webcast to learn:

  • Key privileged access security challenges facing your cloud users
  • Best practices for securing cloud privileged access
  • Proven approach to implementing secure privileged access for remote workers and third parties
  • How privileged access cloud security solutions can add value to your business on multiple levels

Thycotic is the leading provider of cloud-ready privilege management solutions and has helped many organizations worldwide answer the following questions:

  • What are the critical differences posed by privileged access to cloud applications?
  • How do overprivileged users create one of the greatest risks in the cloud?
  • What’s the best way to implement a least privilege approach that will secure cloud privileged access?
  • What automated tools can help manage and secure privileged access for cloud applications?
DemoCast webcast

Outsmarting cybercriminals: 3 actionable steps to minimize successful phishing attacks

Join us for this democast as we discuss what you can do to minimize the success of phishing attacks against your organization.

Register for Outsmarting cybercriminals: 3 actionable steps to minimize successful phishing attacks

Sponsored by: GreatHorn

Outsmarting cybercriminals: 3 actionable steps to minimize successful phishing attacks

With 94% of breaches starting with attacks targeting people, and phishing as the top threat action in confirmed breaches (32%), every organization is trying to stay on top of email security to mitigate risks. End users, while always your weakest link, are fraught with even more sophisticated and targeted attacks, increasing your security risks. The recent Twitter hack points to the success of social engineering attacks.  Unfortunately, there is no “magic” solution to prevent 100% of all attacks. But what if there were a few actions organizations could take to minimize the success of phishing attacks to more effectively manage secure communications?

Join us for this democast as we discuss what you can do to minimize the success of phishing attacks against your organization. Walk away from this presentation with insight into:

  • Tools to prevent BEC and Account Takeover attacks
  • Actionable insights that allow users to make better decisions
  • Tips to improve your mean time to detect (MTTD) and mean time to respond (MTTR)

Vendor Webcast

Getting the most out of your security tools with automation

In this webcast, Jake Gillen, SOAR Engineer and Julie Rockett, Senior Product Marketing Manager will show you how to coordinate your existing tools to take the ambiguity and inconsistency out of incident response. If you’re afraid that full automation is still too risky, we will show you how to pick and choose what to automate and how to maintain comfortable control over your myriad tools. 

Register for Getting the most out of your security tools with automation

Sponsored by: Swimlane

Getting the most out of your security tools with automation

Are you tired of keeping track of 40+ different tools with 40+ different interfaces and logins? Get your infosec tool stack talking with security orchestration and automation.

In this webcast, Jake Gillen, SOAR Engineer and Julie Rockett, Senior Product Marketing Manager will show you how to coordinate your existing tools to take the ambiguity and inconsistency out of incident response. If you’re afraid that full automation is still too risky, we will show you how to pick and choose what to automate and how to maintain comfortable control over your myriad tools. 

You’ll leave this webcast knowing: 

  • Where it makes sense (and where it might not make sense) to automate security functions 
  • How to combat console fatigue, i.e., the logging into and working within multiple consoles
  • How to level the playing field and ensure you’re able to get to all of your alerts

DemoCast webcast

Developing fast while staying secure

Most of your application code is open source, and you’re relying on containers for running your applications, but are you managing to keep up with security? The only way to scale in a secure way is by empowering developers to embrace security.

Register for Developing fast while staying secure

Sponsored by: Snyk

Developing fast while staying secure

Most of your application code is open source, and you’re relying on containers for running your applications, but are you managing to keep up with security? The only way to scale in a secure way is by empowering developers to embrace security.

Join us and learn how Snyk enables developers to find, prioritize and fix vulnerabilities and license issues in open source dependencies and containers.

DemoCast webcast

Credential stuffing attacks: What are they and how to combat them

In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

Register for Credential stuffing attacks: What are they and how to combat them

Sponsored by: Auth0

Credential stuffing attacks: What are they and how to combat them

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

Join Andrew Akers, Solutions Product Marketing Manager, and Jamie Hughes, Lead Solutions Engineer, at Auth0 to learn:

  • How credential stuffing attacks work

  • What effect they can have on your company

  • How Auth0 can help you detect and mitigate these attacks

Vendor Webcast

10 Incredible ways to hack email & how to stop the bad guys

Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

Register for 10 Incredible ways to hack email & how to stop the bad guys

Sponsored by: KnowBe4

10 Incredible ways to hack email & how to stop the bad guys

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.

You will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all

If all you were worried about were phishing attempts, think again!

Vendor Webcast

Recent DDoS attack trends, and how you should respond

In this webcast, Cloudflare DDoS product experts Omer Yoachimik, and Vivek Ganti will explore new data on DDoS trends and discuss ways to counter these tactics.  

Register for Recent DDoS attack trends, and how you should respond

Sponsored by: CloudFlare

Recent DDoS attack trends, and how you should respond

The past few months have seen significant changes in global DDoS tactics. We can observe these changes in detail by analyzing traffic patterns from Cloudflare’s global network, which protects more than 27 million Internet properties and blocks 45 billion cyber threats every day. What approaches are DDoS attackers using right now, and what are forward-thinking organizations doing in response?  

In this webcast, Cloudflare DDoS product experts Omer Yoachimik, and Vivek Ganti will explore new data on DDoS trends and discuss ways to counter these tactics.  

Join this webcast to learn more about: 

  • How DDoS attack vectors and tactics evolved from April-June 2020 
  • Strategies for responding to these trends, with real-world case studies 
  • Key parameters to consider when picking a DDoS mitigation vendor 

DemoCast webcast

Pass your network security compliance audits the first time

Network security policy management is a critical part of achieving compliance. Firewall audits demand documentation of your security policies. Network security teams frequently spend considerable time gathering this information and, in the process, sometimes discovering that policies may be non-compliant. There is a better way that lets you save time and pass your audits the first time.

Register for Pass your network security compliance audits the first time

Sponsored by: AlgoSec

Pass your network security compliance audits the first time

While it is mission critical to comply with the ever-growing amount of network and data security regulations and internal standards, it’s harder than ever to keep up with them and maintain compliant.

Network security policy management is a critical part of achieving compliance. Firewall audits demand documentation of your security policies. Network security teams frequently spend considerable time gathering this information and, in the process, sometimes discovering that policies may be non-compliant. There is a better way that lets you save time and pass your audits the first time.

AlgoSec’s Director of Product Management, will reveal the Firewall Audit Checklist, best practices to ensure successful audits.

In this webinar, learn:

  • The golden rules for passing a network security audit
  • Best practices for maintaining continuous compliance
  • How to conduct a risk assessment and fix risky rules
  • Prevent fires and pass network security audits every time.

20/20 webcast

Overcoming the risk and vulnerability management conundrum

Managing risk and vulnerabilities are bad enough in “normal” times, but these days are hardly normal. The chaotic state of affairs amongst IT and security teams trying to determine risks with what has become a weird and confusing hybrid collection of work-from-home and on-prem employees makes managing risk and vulnerabilities that much harder. 

Register for Overcoming the risk and vulnerability management conundrum

Sponsored by: Rapid7

Overcoming the risk and vulnerability management conundrum

Managing risk and vulnerabilities are bad enough in “normal” times, but these days are hardly normal. The chaotic state of affairs amongst IT and security teams trying to determine risks with what has become a weird and confusing hybrid collection of work-from-home and on-prem employees makes managing risk and vulnerabilities that much harder. 

This webcast looks at these challenges and attempts to bring order to chaos, helping CISOs prioritize risks and separate the wheat from the chaff when it comes to vulnerabilities.

In this webcast we will cover:

  • How to tune your network management systems to be flexible enough to differentiate between real and perceived threats when workers are no longer tucked safely behind your network firewalls
  • Policies and procedures CISOs need to focus on in order to accomplish a safe environment, especially if work-from-home employees are using personal hardware rather than company owned and secured devices.
  • Some of the most effective ways to employ open source threat intel – often simply referred to as OSINT.

Vendor Webcast

Emerging Cybersecurity Threats & Lessons from COVID-19

Join Mark Sangster, VP Industry Strategist at eSentire for a discussion on emerging cybersecurity lessons from the COVID-19 crisis and how we should respond. 

Register for Emerging Cybersecurity Threats & Lessons from COVID-19

Sponsored by: VMWare

Emerging Cybersecurity Threats & Lessons from COVID-19

Join Mark Sangster, VP Industry Strategist at eSentire for a discussion on emerging cybersecurity lessons from the COVID-19 crisis and how we should respond. 

When a business is distracted it is inevitable that bad actors will take advantage of gaps in our defenses with a more distributed workforce. This opens the door to significant loss, well beyond the immediate future.

Vendor Webcast

How data science is changing cybersecurity

Sr. Principal Engineer, Matt DeMatteo talks about how data science can be used to solve cybersecurity challenges. Matt will review the fundamentals of solving problems with data science, how data science solutions will affect security operations teams, and what challenges lie ahead for adoption of data science solutions.

Register for How data science is changing cybersecurity

Sponsored by: SecureWorks

How data science is changing cybersecurity

Sr. Principal Engineer, Matt DeMatteo talks about how data science can be used to solve cybersecurity challenges. Matt will review the fundamentals of solving problems with data science, how data science solutions will affect security operations teams, and what challenges lie ahead for adoption of data science solutions.

We’ll review:

  • The fundamentals of solving problems with data science.
  • How data science solutions will affect security operations teams.
  • What challenges lie ahead for adoption of data science solutions.

Vendor Webcast

Software is Manufacturing

This webcast describes the current landscape of open source adoption and shows how managing the software supply chain results in products that are safer, more secure, and lower risk.

Register for Software is Manufacturing

Sponsored by: Synopsys

Software is Manufacturing

Software is assembled rather than written. Developers usually select third-party open source software components that provide useful chunks of functionality, then write some code to glue everything together into a complete product. Each software component carries its own risk, which means that managing the supply chain of components is crucial to minimizing overall risk.

Software components carry three types of risk. Known vulnerabilities in software components can be directly absorbed in a software product. Component licenses can be incompatible with a product’s license model. Finally, components can present operational risks.

Left unchecked, software supply chain risks can result in consequences that range from irritating to catastrophic. All product development processes should include automated software supply chain management integrated into the development toolchain.

This webcast describes the current landscape of open source adoption and shows how managing the software supply chain results in products that are safer, more secure, and lower risk.

Vendor Webcast

The American Cyberinsurgency

In today’s evolving threat landscape organizations must be more prepared than ever before. With large scale incidents like Equifax and Target, or the more recent attack on Capital One, breaches are a looming threat. 

Register for The American Cyberinsurgency

Sponsored by: VMWare

The American Cyberinsurgency

In today’s evolving threat landscape organizations must be more prepared than ever before. With large scale incidents like Equifax and Target, or the more recent attack on Capital One, breaches are a looming threat. 

Thankfully, there are security experts who have been in the trenches and have helped recover large companies from even the most hard-hitting attacks. Ike Barnes, Assistant to the Special Agent in Charge at the U.S. Secret Service is one of these experts and is joining this session to share best practices for preparing for and remediating an incident.

Vendor Webcast

2020 Ransomware Hostage Rescue Guide

Ransomware attacks are on the rise, and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

Register for 2020 Ransomware Hostage Rescue Guide

Sponsored by: KnowBe4

2020 Ransomware Hostage Rescue Guide

Ransomware attacks are on the rise, and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.

In this webcast we will cover:

  • What new scary ransomware strains are in the wild.
  • Am I infected?
  • I’m infected, now what?
  • Proven methods of protecting your organization?
  • How to create a “human firewall”

Don’t get held hostage and become a statistic! Join us to learn how to avoid these scary attacks.

Vendor Webcast

Strategies for Overcoming the Security Talent Shortage

Listen to our group of panelists as they discuss strategies to overcome the security talent shortage, techniques for recruiting diverse candidates and best practices for retaining top employees.

Register for Strategies for Overcoming the Security Talent Shortage

Sponsored by: VMWare

Strategies for Overcoming the Security Talent Shortage

Talent in the security world is always a hot commodity. And once you’ve recruited talented workers, retaining them can be a struggle. 

Listen to our group of panelists as they discuss strategies to overcome the security talent shortage, techniques for recruiting diverse candidates and best practices for retaining top employees.

Vendor Webcast

A Tale of Two Ransoms

Are you protected? Join us for A Tale of Two Ransoms where you will learn about these new tactics and how to recognize early warning signs that you may be under attack.

Register for A Tale of Two Ransoms

Sponsored by: VMWare

A Tale of Two Ransoms

According to Cybersecurity Ventures, costs associated with ransomware attacks are estimated to reach a staggering $20 billion dollars by next year, making it a top concern for most organizations. Ransomware attacks continue to grow in complexity, producing catastrophic results for those targeted. We’ll dissect two ransomware campaigns which use contrasting attack vectors to gain access to victim networks, helping you better understand the ever-evolving threat landscape.

  • While phishing campaigns still reign supreme, we will highlight a variant that deploys a banking trojan within the environment prior to executing the ransomware attack
  • Threat actors are using common vulnerabilities to gain unauthorized access to perform reconnaissance on the target and then execute their attack

Are you protected? Join us for A Tale of Two Ransoms where you will learn about these new tactics and how to recognize early warning signs that you may be under attack.

Vendor Webcast

5 Tactics for Selling Security to Senior Leadership

In this session, Alex Philips, CIO and CISO at a Fortune 500 oil and gas company, will share 5 key success strategies from his own experience in selling the value of security upward.

Register for 5 Tactics for Selling Security to Senior Leadership

Sponsored by: VMWare

5 Tactics for Selling Security to Senior Leadership

Talking to your board and executive leadership about security initiatives can be a daunting task.

In this session, Alex Philips, CIO and CISO at a Fortune 500 oil and gas company, will share 5 key success strategies from his own experience in selling the value of security upward.

Vendor Webcast

Cybersecurity Insights – Security as a Team Sport

Join VMware COO, Sanjay Poonen, as he is joined by industry experts to discuss how Security and IT can better protect their organizations from cyberattacks when working in closer alignment through a common strategy.

Register for Cybersecurity Insights – Security as a Team Sport

Sponsored by: VMWare

Cybersecurity Insights – Security as a Team Sport

Join VMware COO, Sanjay Poonen, as he is joined by industry experts to discuss how Security and IT can better protect their organizations from cyberattacks when working in closer alignment through a common strategy.

Be among the first to learn about the current state of the IT-Security relationship dynamics as we unveil the results from a study of over 1,400 Security and IT professionals completed in partnership with Forrester.

Vendor Webcast

Cyber crisis simulation: You’re in control

This webinar will throw attendees into an emerging breach simulation. Delegates will be collectively in control of how a fictional company reacts to technical, business, and risk challenges in near real-time, making decisions using their mobile devices in response to the evolving scenario. The elements of this scenario will use examples from recent breaches and highlight potential missteps made by those organizations. 

Register for Cyber crisis simulation: You’re in control

Sponsored by: Immersive labs

Cyber crisis simulation: You’re in control

Another day, another breach. Businesses have never been more acutely aware of the increased likelihood of data being compromised as a result of a cyber attack. Formulating response plans and crafting policies are top of mind for security and risk professionals, but these efforts can never really factor in the human element when the worst happens. How do time and pressure impact on decision-making? How can organizations be sure that the right people are involved in breach response and know what the wider business impact is?

This webcast will throw you into an emerging incident simulation. You’ll be in control of how a fictional company reacts to technical, business and risk challenges in near real-time, making decisions on your mobile device in response to the evolving scenario. The elements of this scenario will use examples from recent breaches and highlight potential missteps made by those organizations. 

As we move through the simulation, the impact of decisions on factors like corporate risk, share price, and reputation will be visualized. This session is designed to simulate the tightrope to be walked in responding to a breach when dealing with technical attribution, public relations, legal obligations and more.

You will be able to:

  • See the impact of the human element in data breach response
  • Gain a greater understanding of how decisions in a breach scenario have a business-wide impact
  • Examine missteps in responses to recent highly publicized breaches
  • And more

Vendor Webcast

SASE Convergence of Cloud Security and Networking

Hear about new functionality in Cisco Umbrella’s secure web gateway, cloud-delivered firewall, CASB capability, and SecureX integration. All combine to deepen visibility, protection, and control of your internet traffic with simplifying your security deployment and management.

Register for SASE Convergence of Cloud Security and Networking

Sponsored by: Cisco

SASE Convergence of Cloud Security and Networking

Exploding SaaS usage. Proliferating remote locations. Swelling ranks of roaming workers. It’s the new normal. Ensuring security for this cloud-centered reality is paramount. Join us and learn about Cisco’s breakthrough in SASE convergence, including united cloud security and SD-WAN.

Hear about new functionality in Cisco Umbrella’s secure web gateway, cloud-delivered firewall, CASB capability, and SecureX integration. All combine to deepen visibility, protection, and control of your internet traffic with simplifying your security deployment and management.

20/20 webcast

Managing Cloud Device Sprawl

This 20/20 webcast looks at how IT departments can better manage not only cloud device sprawl, but all kinds of virtual devices that can store data and have assigned IP addresses. So, whether you’re firing up a virtual server, a new cloud instance or cloud-based storage device, you can control the building and decommissioning of virtual machines, wherever they might be.

Register for Managing Cloud Device Sprawl

Sponsored by: Axonius

Managing Cloud Device Sprawl

The great thing about building out the cloud is that it is generally fast and easy. Take virtual machines as an example. They are easy to create. You can build it once and replicate it multiple times. They are relatively inexpensive, and you don’t need to be in the IT department to launch a new server. The bad thing about VMs is that you don’t need to be in IT to launch them. People forget to decommission them when they’re done, and they can be a security vulnerability. The same can be said for launching a variety of cloud instances and S3 buckets. Quick, easy and potentially insecure. Ironically, managing server sprawl was much easier when you could actually see the servers.

This 20/20 webcast looks at how IT departments can better manage not only cloud device sprawl, but all kinds of virtual devices that can store data and have assigned IP addresses. So, whether you’re firing up a virtual server, a new cloud instance or cloud-based storage device, you can control the building and decommissioning of virtual machines, wherever they might be.

20/20 webcast

The Evolving Workplace

This 20/20 webcast looks at that evolution, what it will mean to both the security teams and the returning workers, and how threats will change.

Register for The Evolving Workplace

Sponsored by: SecureWorks

The Evolving Workplace

In last month’s 20/20 webcast, we talked at length about managing remote workers. On July 8, we will focus on how the workforce is evolving with some of these workers rejoining their colleagues in corporate offices while others will remain remote, working from their homes or other off-site locations. The workforce, as we knew it, is undergoing a permanent change, but it remains to be seen what the new normal will be.

 

This 20/20 webcast looks at that evolution, what it will mean to both the security teams and the returning workers, and how threats will change.

Vendor Webcast

The path forward: What cybersecurity leaders should know

Join PwC’s US and Global Cybersecurity, Privacy and Forensics Leader, Sean Joyce, and Cyber and Privacy Innovation Institute Leader, Joe Nocera, as they share key findings from the Digital Trust Insights Pulse Survey.  

Register for The path forward: What cybersecurity leaders should know

Sponsored by: PWC

The path forward: What cybersecurity leaders should know

Keeping workers safe and enterprise systems secure have gone hand-in-hand during this pandemic. The COVID-19 crisis has been a time of great disruption, but also a time of remarkable resilience and agility.  How has the crisis impacted an organization’s cybersecurity strategy, now and in the near future?

Join PwC’s US and Global Cybersecurity, Privacy and Forensics Leader, Sean Joyce, and Cyber and Privacy Innovation Institute Leader, Joe Nocera, as they share key findings from the Digital Trust Insights Pulse Survey.  

In this webcast, we’ll reflect on the views of over 140 responses from CISOs and Heads of IT on the following topics:

  • Cybersecurity investments – what has paid off and what needs to be considered
  • The impact of the crisis on the CISO’s role
  • The changing threat landscape
  • Lessons learned, and plans to emerge stronger

20/20 webcast

Proactive Cyber Defenses

Companies also are being more aggressive about ensuring their supply chains are safe and using threat intelligence to reduce the number of known attack vulnerabilities. What are you doing to protect your network in advance, and how do you sell these proactive programs to your C-Suite

Register for Proactive Cyber Defenses

Sponsored by: Anomali

Proactive Cyber Defenses

When one thinks of the word “defense,” an image of something stopping an intruder often comes to mind. But what if your defenses became proactive and went on the offensive? That’s the idea behind such security strategies as red and blue team, threat sharing, and the use of artificial intelligence to build smarter threat intelligence defenses. Rather than waiting for the attackers, some CISOs are doing their own hacking of their own and their partners’ applications, making sure that there are no Zero Days being introduced into their networks. 

Companies also are being more aggressive about ensuring their supply chains are safe and using threat intelligence to reduce the number of known attack vulnerabilities.

What are you doing to protect your network in advance, and how do you sell these proactive programs to your C-Suite?

Vendor Webcast

Top 5 Best Practices to Elevate Your Threat Hunting Program

The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.

Register for Top 5 Best Practices to Elevate Your Threat Hunting Program

Sponsored by: ReversingLabs

Top 5 Best Practices to Elevate Your Threat Hunting Program

Threat hunting is no longer a luxury, but a necessity. The sheer volume of threats and the ability of malware to lurk undetected warrants a program and skillset that proactively reduce time to detection and mitigate business risk. The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.

In this session, we’ll discuss:

  • How to assess your Threat Hunting maturity
  • How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
  • How to manage YARA rules and local Threat Intelligence to expose hidden threats
  • How to create an Early Warning System to identify threats before they have a chance to proliferate

Vendor Webcast

Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

Don’t click phishy links. Everyone knows that. But are your end users prepared to quickly identify today’s tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They’re now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

Register for Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

Sponsored by: KnowBe4

Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

Don’t click phishy links. Everyone knows that. But are your end users prepared to quickly identify today’s tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They’re now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

Join us when Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, shows you how to become a rogue URL expert. He’ll dive deep into the latest techniques and defenses to share:

  • Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
  • Safe forensic methods for examining URLs and other tactics for investigating phishy emails
  • Strategies for dissecting URLs on mobile without clicking
  • Simple ways you can train your users to scrutinize URLs and keep your network safe

Vendor Webcast

Secure Your Remote Workforce

This webcast will discuss the issue of securing remote workforces and include a brief demo of Qualys’ free Remote Endpoint Protection offering

Register for Secure Your Remote Workforce

Sponsored by: Qualys

Secure Your Remote Workforce

The unprecedented shift towards remote working caused by the COVID-19 crisis has created significant new IT and cybersecurity challenges. Remote employees working from home need to be managed drastically different than those on a corporate network. Detecting malware, vulnerabilities and patching hundreds of thousands of remote computers through VPNs is one of the top issues.

This webcast will discuss the issue of securing remote workforces and include a brief demo of Qualys’ free Remote Endpoint Protection offering.

Vendor Webcast

Security Skill Wars: A New Perspective

The role of a C-level executive comes with unbridled burdens. When specifically looking at IT and Security, it’s an ever-slogging fight at times to reduce risk and train employees on basic security hygiene principles, let alone defining your ROI in the process.

Register for Security Skill Wars: A New Perspective

Sponsored by: VMWare

Security Skill Wars: A New Perspective

When looking at your workforce, where are your gaps? If you aren’t able to clearly define tasks and projects, you’re going to be left with frustrated employees, if any at all.

The role of a C-level executive comes with unbridled burdens. When specifically looking at IT and Security, it’s an ever-slogging fight at times to reduce risk and train employees on basic security hygiene principles, let alone defining your ROI in the process. Managing the skills gap can lead to high stress and career risk, but let’s talk about how we can mitigate that by making measurable agreements, assessing the “now,” and rethinking job descriptions.

In this webcast, Rick McElroy (Cybersecurity Strategist, VMware Carbon Black) and Deidre Diamond (Founder & CEO, CyberSN) will discuss:

  • How to reduce turnover and alleviate burnout
  • Getting buy-in from your business to build out your workforce
  • A model for human hygiene in your team’s core responsibilities

Vendor Webcast

Design Thinking for Zero Trust

Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet?

Register for Design Thinking for Zero Trust

Sponsored by: Duo Security

Design Thinking for Zero Trust

Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. While building a zero-trust strategy can improve security wherever a system must make an access decision, ignoring the behavior of the user and their experience can ground these initiatives before you’ve even taken off.

With this in mind, it becomes crucial to ask the right questions: what exactly happens where people and technology meet? At the very moment of human/system interaction, what factors in human psychology and industrial design are at play? And if we could pause time for a moment to catalog and identify those factors, could we design a better experience, a better outcome, and a better path to the future?

Join this webcast with J. Wolfgang Goerlich, an Advisory CISO at Duo Security, as he explores these questions and details lessons that cyber security practitioners can learn from the principles of industrial design.

Vendor Webcast

Balancing Flexibility and Security for Roaming Users

Join us for a live chat hosted by Meg Diaz of Cisco Umbrella and featuring Avanade, a global professional services consulting company.

Register for Balancing Flexibility and Security for Roaming Users

Sponsored by: Cisco

Balancing Flexibility and Security for Roaming Users

It’s no secret that more companies are embracing remote work and cloud apps, but how do you keep roaming users secure without reducing productivity? That’s where Cisco Umbrella comes in.

Join us for a live chat hosted by Meg Diaz of Cisco Umbrella and featuring  Avanade, a global professional services consulting company.

We’ll discuss how networking and security teams can keep roaming users safe without sacrificing performance and keep security operations teams happy.

 

Vendor Webcast

Strengthening security posture for modern-age SaaS providers

 Join this webcast to learn more about how ActiveCampaign, leverages Cloudflare to deliver meaningful services to their end users. 

Register for Strengthening security posture for modern-age SaaS providers

Sponsored by: ActiveCampaign, CloudFlare

Strengthening security posture for modern-age SaaS providers

Businesses become more resilient in times of crises. This is especially true for SaaS businesses that are facing unprecedented challenges in this environment. While some are catering to a surge in traffic, others are figuring out innovative solutions to retain their customers. In addition, increasing malicious attacks are straining the resources of these SaaS businesses. 

Now more than ever, it is important for SaaS providers to deliver an uninterrupted experience. One that is fast, secure, and reliable to their customers in a cost effective manner.

Join this webcast to learn more about how ActiveCampaign, leverages Cloudflare to deliver meaningful services to their end users. 

 

20/20 webcast

SOARing in the Networks

 This webcast looks at SOAR and provides you with the insights you will need to be ready if your cloud environment is attacked.

Register for SOARing in the Networks

Sponsored by: Swimlane

SOARing in the Networks

Have you ever considered data SOARing through the clouds—or perhaps across your corporate network? We know this seems a bit farfetched, but it does. Automation is the process of accomplishing a task or function without human intervention, while orchestration integrates your disparate products and coordinates the automated tasks via workflows. Clear enough. 

So adopting a security orchestration, automation and response platform (SOAR) means you can remediate a security breach or incident in cloud applications or on servers to which you don’t have physical access. It’s a significant challenge but one companies continue to face.

This webcast looks at SOAR and provides you with the insights you will need to be ready if your cloud environment is attacked.

 

20/20 webcast

Defending Network Prime

 This 20/20 webcast looks at why the most basic of all security specialties is still the #1 target for attackers and what you need to know today in order to stop these attacks.

Register for Defending Network Prime

Sponsored by: Gigamon

Defending Network Prime

Network admins and security techs use network detection and response every day in their roles. This family of technologies is critical to monitor who is on the network, what they’re doing, and to stop those who don’t belong.

It’s so basic that getting this wrong can result in serious damage of a company’s environment. Yet despite the fact that everyone knows it has to be done and done right, bad actors get into good networks every day, often multiple times a day.

This 20/20 webcast looks at why the most basic of all security specialties is still the #1 target for attackers and what you need to know today in order to stop these attacks.

 

Vendor Webcast

The state of data loss prevention 2020: Why DLP is failing and what you can do about it

 Our findings reveal that data loss on email is a bigger problem than most realize, that remote-working brings new challenges around DLP, and that the solutions currently deemed most effective may actually be the least.

Register for The state of data loss prevention 2020: Why DLP is failing and what you can do about it

Sponsored by: Tessian

The state of data loss prevention 2020: Why DLP is failing and what you can do about it

Is remote working putting your DLP to the test? Join other security leaders assessing the state of their DLP today and find out what data loss strategies are effective (and which aren’t) for this new working world. 

Tessian’s brand new research explores new and perennial challenges around data loss and identifies the most effective DLP solutions. 

Our findings reveal that data loss on email is a bigger problem than most realize, that remote-working brings new challenges around DLP, and that the solutions currently deemed most effective may actually be the least

Webcast viewers will:

  • Gain visibility into the frequency of data loss incidents on email, which are happening as much as 38x more often than IT leaders currently estimate
  • Learn why security awareness training, policies and procedures, and rule-based solutions alone aren’t enough to prevent data loss
  • Understand the impact compliance standards like GDPR and CCPA have on how employees handle data

 

Vendor Webcast

Enterprise IoT: Exploring the threat of unknown devices on your network

 This webinar will discuss the challenges the CISOs face today and how eIoT increases overall risk. We will provide guidance for how to gain visibility into eIoT and we will discuss how machine learning can provide the needed context and correlation of all devices to detect threats and improve the overall security posture of your network.

Register for Enterprise IoT: Exploring the threat of unknown devices on your network

Sponsored by: Extrahop

Enterprise IoT: Exploring the threat of unknown devices on your network

You need complete visibility to protect your organization against threats. But what about rogue or even known enterprise IoT (eIoT) devices?

For most security teams, these devices are either not on their radar or remain an unmonitored vulnerability. This is significant because the next generation of enterprise IoT is becoming more than a group of devices — it  has morphed into mission-critical, enterprise-wide services that leverage edge-computing and modern hybrid architectures. eIoT devices pose a threat because they are difficult to manage and are most often an easy point of entry to your network.

This webinar will discuss the challenges the CISOs face today and how eIoT increases overall risk. We will provide guidance for how to gain visibility into eIoT and we will discuss how machine learning can provide the needed context and correlation of all devices to detect threats and improve the overall security posture of your network.

 

Vendor Webcast

Security Awareness Blind Spots: Rethinking Your Program in the Year of COVID-19

 This webinar we’ll provide complimentary resources you can use to keep your remote workforce safe, and provide you the opportunity to take our People Risk Assessment to find your security awareness blind spots.

Register for Security Awareness Blind Spots: Rethinking Your Program in the Year of COVID-19

Sponsored by: Proofpoint

Security Awareness Blind Spots: Rethinking Your Program in the Year of COVID-19

COVID-19 has changed everything. It’s changed how we work, communicate, and especially how we think about security awareness programs. With users now working from home, they are facing new threats. During this webinar, we will dig into potential user risk you may be missing – and how to address it.

Join us as we take a deeper dive into potential security awareness blind spots. By attending this webinar, you will learn;

  • How your user’s knowledge and behavior can impact your security posture
  • Immediate actions you can take to make your organization safer today
  • How to pivot your security awareness program to assess and reduce these new risks

At the end of the webinar we’ll provide complimentary resources you can use to keep your remote workforce safe, and provide you the opportunity to take our People Risk Assessment to find your security awareness blind spots.

 

20/20 webcast

Phishing Incident Response

This 20/20 webcast looks at some of the tactics you can employ after a breach is identified to limit damage and reduce the impact on your company, employees and customers.

Register for Phishing Incident Response

Sponsored by: Cofense

Phishing Incident Response

Bad things happen to good companies. Even companies with excellent employee training and top shelf email security can still experience a breach due to a phishing attack. Let’s face it – some of these attackers can write a very convincing spear phishing message.

This 20/20 webcast looks at some of the tactics you can employ after a breach is identified to limit damage and reduce the impact on your company, employees and customers.

20/20 webcast

The forced evolution of MSSPs: What’s next?

This 20/20 webcast dives into the recent market shift from MSSP to MTDR, and why it’s a direct result of a need to focus specifically on bolstering the security posture of the modern-day enterprise. 

Register for The forced evolution of MSSPs: What’s next?

Sponsored by: Trustwave

The forced evolution of MSSPs: What’s next?

If we were to tell you that there’s a nomenclature problem plaguing the cybersecurity industry, chances are you’d laugh. The alphabet soup of acronyms available to the modern-day security leader is abundant enough to quickly turn their appetite for a new solution into a nauseous distaste for technology. 

But this goes beyond wordplay. Sometimes, the rapidly evolving threat landscape has such a profound impact in the cybersecurity services space that the demand and need for specific solutions causes an absolute shift in the market. That’s what’s occurred with Managed Security Service Providers (MSSP). 

Today, there’s a fundamental shift occurring in what security leaders expect from MSSPs. Enter Threat Detection and Response (TDR) vendors. By focusing solely on security outcomes and eradicating attackers, versus providing a buffet menu of services, TDR players have quickly taken center stage for security organizations battling an expanded attack surface presented by current working conditions that are a result of a global pandemic. 

This 20/20 webcast dives into the recent market shift from MSSP to MTDR, and why it’s a direct result of a need to focus specifically on bolstering the security posture of the modern-day enterprise. 

 

Vendor Webcast

AppSec: Pushing Left, Like A Boss

From scanning your code with a vulnerability scanner to red team exercises, developer education programs and bug bounties, this talk will show you how to ‘push left’, like a boss.

Register for AppSec: Pushing Left, Like A Boss

Sponsored by: WhiteSource

AppSec: Pushing Left, Like A Boss

With incident response and penetration testing currently receiving most of our application security dollars, it would appear that industry has decided to treat the symptom instead of the disease. “Pushing left” refers to starting security earlier in the SDLC; addressing the problem throughout the process. From scanning your code with a vulnerability scanner to red team exercises, developer education programs and bug bounties, this talk will show you how to ‘push left’, like a boss.

Vendor Webcast

Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network.

Register for Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

Sponsored by: KnowBe4

Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator! You’ll learn:

  • How to forensically examine phishing emails and identify other types of social engineering
  • What forensic tools and techniques you can use right now
  • How to investigate rogue smishing, vishing, and social media phishes
  • How to enable your users to spot suspicious emails sent to your organization 

 

DemoCast webcast

Rapidly reduce risk by prioritizing PAM as a service

Join us for a 30 minute session on CyberArk Privilege Cloud, the PAM as a Service offering from the #1 Leader in Privileged Access Management. We’ll discuss how organizations can retain all the security they need without devoting time, money or resources to managing infrastructure, upgrading or patching software or requiring multiple SMEs to properly administer PAM.

Register for Rapidly reduce risk by prioritizing PAM as a service

Sponsored by: CyberArk

Rapidly reduce risk by prioritizing PAM as a service

For years, securing privileged accounts and credentials has presented both the biggest opportunity for attackers, as well as a major priority and subsequent headache for security and IT teams. To combat this, too many organizations look for the easy way out in securing passwords for their IT superusers. The problem with this is that there’s much more to it than just rounding up passwords for privileged users and stuffing them in a spreadsheet. 

There are also audit and compliance requirements, as well as the need to isolate privileged credentials from vulnerable workstations while keeping end-users happy by supporting native tools like PuTTY, RDP and SSH. Furthermore, there are also likely a variety of non-human users like service accounts, commercial off the shelf applications and more that perform critical business tasks and require advanced access. All these use cases are essential to securing privileged access and staving off attackers. Attackers don’t care how they get access; but once they get it the ramifications for organizations can be dire. 

Join us for a 30-minute session on CyberArk Privilege Cloud, CyberArk’s PAM as a Service offering. We’ll discuss how organizations can retain all the security they need without devoting time, money or resources to managing infrastructure, upgrading or patching software or requiring multiple SMEs to properly administer PAM.

Featured Speaker: Matt Tarr, Principal Solutions Engineer

Featured Speaker: Barak Feldman, VP Emerging Technologies

20/20 webcast

Managing Remote Workers

This 20/20 webcast looks at the decisions security teams need to make in order to allow business operations to continue unimpeded — be it electronic or video — while workers are remote, including the hard questions that need to be asked in order to put all the pieces together.

Register for Managing Remote Workers

Sponsored by: SecureWorks

Managing Remote Workers

Let’s face it — not every company is comfortable or able to manage a workforce that suddenly is working off site. Recent trends in employee management have included building a team-based workforce with lots of collaboration and workspaces that encouraged small groups to work together. Part of the fallout from the COVID-19 pandemic is the immediate need for social distancing and more remote workers, meaning that the type of collaboration companies promote is changing.

From a cybersecurity standpoint, that means CISOs who are trying to maintain this collaboration model need to invest in applications that are compliant with the multitude of privacy and data management laws.

This 20/20 webcast looks at the decisions security teams need to make in order to allow business operations to continue unimpeded — be it electronic or video — while workers are remote, including the hard questions that need to be asked in order to put all the pieces together.

Vendor Webcast

2020 Asset Management Trends: Navigating Visibility Gaps

Axonius commissioned a research study with Enterprise Strategy Group (ESG) to uncover how asset visibility challenges are impacting IT and cybersecurity professionals across organizations in North America.

Register for 2020 Asset Management Trends: Navigating Visibility Gaps

Sponsored by: Axonius

2020 Asset Management Trends: Navigating Visibility Gaps

Gaining visibility into a comprehensive asset inventory is becoming more complex as three trends converge: the increase in the number and types of devices, rapid public cloud adoption, and the looming IoT explosion. Axonius commissioned a research study with Enterprise Strategy Group (ESG) to uncover how asset visibility challenges are impacting IT and cybersecurity professionals across organizations in North America. 

Join us for a webinar on May 6 at 2 p.m. ET as Nathan Burke, CMO at Axonius and Dan Trauner, Director of Security discuss:

  • Detailed research findings on asset inventory, cloud asset, and IoT asset visibility gaps
  • Practical implications and considerations for security teams
  • Tips and tricks on implementing and improving an asset inventory process
  • Emerging innovations and approaches to continuous asset discovery and automation

Vendor Webcast

3 Steps to Secure Remote Workers and Students

Hit the couch or your newly converted bedroom office and join us on Tuesday, April 28 at 11.am. PT | 2 p.m. ET for this 20 minute step-by-step webinar on how you can improve your security for remote employees and students, without overburdening your staff.  

Register for 3 Steps to Secure Remote Workers and Students

Sponsored by: Cisco

3 Steps to Secure Remote Workers and Students

With less budget, fewer resources, and more employees working from home than ever, you may be feeling overwhelmed. You are not alone. We’ve entered uncharted waters — but that doesn’t mean you’re left without a paddle and a lifejacket. As you navigate this new world of increased remote working, home-schooling, and telemedicine, there are some best practices you can adopt to help keep your employees, staff and students safe. We can help you quickly protect all laptops and Chromebook devices across your organization. 

Hit the couch or your newly converted bedroom office and join us on Tuesday, April 28 at 11.am. PT | 2 p.m. ET for this 20 minute step-by-step webinar on how you can improve your security for remote employees and students, without overburdening your staff.  

We’ll cover: 

  • Why additional security measures are required  
  • How Cisco Umbrella secures remote users on their devices  
  • Deployment scenarios and tips to help you get started  

Vendor Webcast

Advancing your cloud migration strategy with confidence

This webcast examines best practices to help organizations advance their cloud strategy without sacrificing security. Our speaker, Jim DeLorenzo from nCipher, identifies security challenges, illustrates what HSMs are and how they work, and highlights how using HSMs on-premises or as a service ensures you maintain control of your cryptography no matter where your applications are running.  

Register for Advancing your cloud migration strategy with confidence

Sponsored by: nCipher

Advancing your cloud migration strategy with confidence

Organizations take advantage of cloud computing for its flexibility, convenience, and cost-effectiveness. Moving workloads to the cloud allows computing and data storage to be used on-demand, reducing capital expenditures. However, as organizations advance cloud migration strategies, security typically tops their list of concerns.

Whether designing new applications to run off-premises on a cloud-first approach, or lifting and shifting existing workloads to private, public, or hybrid clouds, cryptography is used for security. Cloud service providers offer protection of the keys that secure applications and data, but this gives customers little control. Customers that require greater control can generate and bring their own keys using hardware security modules (HSMs) they own or subscribe to as a service.  

This webcast examines best practices to help organizations advance their cloud strategy without sacrificing security. Our speaker, Jim DeLorenzo from nCipher, identifies security challenges, illustrates what HSMs are and how they work, and highlights how using HSMs on-premises or as a service ensures you maintain control of your cryptography no matter where your applications are running.  

Join this webcast to learn:

  • What are critical challenges for cloud migration
  • Why controlling underpinning keys is important
  • How establishing a root of trust protects your keys – and your data

 

Vendor Webcast

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff.

Register for Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

Sponsored by: KnowBe4

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will dive into:

  • Why data backups (even offline backups) won’t save you
  • Evolved threats from data-theft, credential leaks, and corporate impersonation
  • Why ransomware isn’t your real problem
  • How your end users can become your best, last line of defense

 

20/20 webcast

What’s Under Your Network’s Hood

Identifying and removing attacks before they enter the user environment has been the raison d’être for security software since the 1990s, but as attackers get more sophisticated and attacks morphed from signature-based viruses to social-engineered phishing, the playing field and the types of attacks changed dramatically. This Special Report looks at how bolstering your email-based security defenses

Register for What’s Under Your Network’s Hood

Sponsored by: Cofense

What’s Under Your Network’s Hood

If you can’t see something, does it really exist? If your network cannot identify and purge phishing attacks, do you really have network security? Identifying and removing attacks before they enter the user environment has been the raison d’être for security software since the 1990s, but as attackers get more sophisticated and attacks morphed from signature-based viruses to social-engineered phishing, the playing field and the types of attacks changed dramatically.

This Special Report looks at how bolstering your email-based security defenses

  • Both technologically and from a user perspective

  • Can enhance your existing security operations organization and overcome one of the attackers’ favorite inroads into the corporate network.

Vendor Webcast

AV-Test places Cisco Umbrella first in security efficacy

Learn how Cisco Umbrella, backed by Talos, has the horsepower to actively process and enforce more than 7 million unique malicious domains and IPs concurrently at the DNS layer. Plus, see firsthand how you can log and inspect all web traffic for greater transparency, control and protection with our cloud-based secure web gateway functionality. Appliances and hybrid-cloud solutions can’t come close to enforcing that many threats at once.

Register for AV-Test places Cisco Umbrella first in security efficacy

Sponsored by: Cisco

AV-Test places Cisco Umbrella first in security efficacy

Lots of network security providers claim they are the best. Well we’ve got proof! Brand new third party research from AV-TEST reveals Cisco Umbrella is the leader in security efficacy according to the 2020. If you’re tired of endless security alerts and chasing threats that could have been blocked before damage occurred, you don’t want to miss this webinar!

Learn how Cisco Umbrella, backed by Talos, has the horsepower to actively process and enforce more than 7 million unique malicious domains and IPs concurrently at the DNS layer. Plus, see firsthand how you can log and inspect all web traffic for greater transparency, control and protection with our cloud-based secure web gateway functionality. Appliances and hybrid-cloud solutions can’t come close to enforcing that many threats at once.

With 60,000+ new destinations added daily to our block list, and more than 3 million new domains added daily, Cisco Umbrella delivers unmatched visibility and threat protection. Join us to learn how Umbrella crushed the competition in a new report from AV-Test. Get ready to cut your malware by 50% in minutes, enterprise wide

Vendor Webcast

2020 ATT&CK Vision | Correlating TTPs to Disrupt Advanced Cyber-Attacks

MITRE ATT&CK has a major impact on the cybersecurity industry and has given defenders a haystack in which to focus their searching efforts. In a short time, this framework has helped to empower the community with a consistent understanding of evolving TTPs

Register for 2020 ATT&CK Vision | Correlating TTPs to Disrupt Advanced Cyber-Attacks

Sponsored by: VMWare

2020 ATT&CK Vision | Correlating TTPs to Disrupt Advanced Cyber-Attacks

MITRE ATT&CK has a major impact on the cybersecurity industry and has given defenders a haystack in which to focus their searching efforts. In a short time, this framework has helped to empower the community with a consistent understanding of evolving TTPs. What’s most interesting, is where and how these TTPs intersect and how we can use that information to determine patterns and disrupt attacks.

Join Rick McElroy and Greg Foss on April 14th as they discuss these findings, and how to use them to protect your own security environment

Vendor Webcast

How to Stop the COVID-19 Phishing Outbreak

Organizations in every industry are seeing a spike in attempts to exploit anxiety about COVID-19 through phishing email and websites that impersonate the CDC, offer vaccines, and prompt users toward the fateful clicks and credential harvesting that lead to malware, ransomware, data theft and rogue financial transactions.

Register for How to Stop the COVID-19 Phishing Outbreak

Sponsored by: Area 1

How to Stop the COVID-19 Phishing Outbreak

Preying  on  employees’ fears of the spreading novel coronavirus known as COVID-19, threat actors are deploying next-gen phishing attacks  to infiltrate Cloud email and get past Secure Email Gateways

Organizations in every industry are seeing a spike in attempts to exploit anxiety about COVID-19 through phishing email and websites that impersonate the CDC, offer vaccines, and prompt users toward the fateful clicks and credential harvesting that lead to malware, ransomware, data theft and rogue financial transactions.

In this webinar, seasoned cyber threat researcher Juliette Cash will help security professionals:

  • Identify the characteristics of COVID-19 phishing attacks and the key attributes that make them effective 
  • Understand how these attacks can be blocked preemptively, before they get to users’ inboxes
  • Develop strategies and a technology posture for preventing phishing attacks that bring new levels of efficiency and effectiveness to SOC teams

Vendor Webcast

How to Disrupt Cyber Attacks with a Layered Defense

We’ve covered common cyberattacks – like spear phishing, island hopping, and ransomware – in previous webinars, but now it’s time to pull together a layered defense strategy. Understanding why and how attacks happen in the first place becomes integral in protecting your systems and your data.

Register for How to Disrupt Cyber Attacks with a Layered Defense

Sponsored by: VMWare

How to Disrupt Cyber Attacks with a Layered Defense

We’ve covered common cyberattacks – like spear phishing, island hopping, and ransomware – in previous webinars, but now it’s time to pull together a layered defense strategy. Understanding why and how attacks happen in the first place becomes integral in protecting your systems and your data.

Join us for this capstone on-demand webinar in which you will learn:

  • how threats continue to evolve
  • what types of attacks are still on the rise
  • best practices that organizations can implement to protect themselves

Vendor Webcast

Multi-Cloud Security: Removing Friction from the Development Process

Join this webinar to learn how cloud deployments are affecting  security teams and how they can use agentless NDR to remove friction with developers, help developers bake security into their processes, and gain the speed and agility in threat detection and response they need to secure their growing business.

Register for Multi-Cloud Security: Removing Friction from the Development Process

Sponsored by: Extrahop

Multi-Cloud Security: Removing Friction from the Development Process

An estimated 500 million new apps will be created in the next five years—more than the total created in the previous four decades. Cloud workflows have helped organizations of all sizes adopt a DevOps mindset, but for SecOps, digital transformation to the cloud creates new vulnerabilities.

Cloud environments expand the attack surface and erase visibility into critical infrastructure and applications, introducing so much complexity—especially inthe case of multi-cloud, used by many 80 percent of enterprises and growing—that many security leaders are forced to say “no” to progress.

There is a way to attack this problem from the inside out. Network Detection and Response (NDR) cuts through hybrid, cloud, and multi-cloud complexity to deliver visibility, threat detection, and automated response at scale.

Join this webinar to learn how cloud deployments are affecting  security teams and how they can use agentless NDR to remove friction with developers, help developers bake security into their processes, and gain the speed and agility in threat detection and response they need to secure their growing business.

Vendor Webcast

Accelerate Threat Detection and Response in Modern Networks

Drawing on learnings from Rapid7’s Research and MDR teams, explore ways to improve security effectiveness with the right telemetry, analytics, and workflows to find threats earlier and respond faster. 

Register for Accelerate Threat Detection and Response in Modern Networks

Sponsored by: Rapid7

Accelerate Threat Detection and Response in Modern Networks

With sprawling environments, multiple clouds,and businesses dependency on IT, security is challenged to keep up with mountains of data, zero in on real threats, and respond quickly to incidents.

Drawing on learnings from Rapid7’s Research and MDR teams, explore ways to improve security effectiveness with the right telemetry, analytics, and workflows to find threats earlier and respond faster. 

20/20 webcast

Open Source Threat Intelligence

This webcast will look at trends in open source threat intelligence and how we can take advantage of these advancements.

Register for Open Source Threat Intelligence

Sponsored by: Anomali

Open Source Threat Intelligence

It is not that threat intelligence is new that makes a difference today; it is that it is becoming the norm rather than the exception. Not only that, threat intelligence also is becoming more diverse and distinctive. Gone are the days when companies relied strictly on data feeds of threats that were known.

Today we are seeing an expansion of threat intel that pulls together customized threats for specific industries, open source threat intel, and avast array of data about emerging threats.

This webcast will look at trends in open source threat intelligence and how we can take advantage of these advancements.

DemoCast webcast

SOC-as-a-Service: Detect, Investigate, and Resolve Threats Faster

In this democast, we’ll discuss how SOC-as-a-Service can help, and what to look for in a modern managed security service provider (MSSP). We’ll also provide a demo of our cloud native ActiveEye platform which offers complete visibility into your cloud, endpoint, and network security, along with 24×7 expert support to detect, investigate, and resolve threats faster.

Register for SOC-as-a-Service: Detect, Investigate, and Resolve Threats Faster

Sponsored by: Delta Risk

SOC-as-a-Service: Detect, Investigate, and Resolve Threats Faster

Organizations today have more attack surfaces and threats to worry about than ever. To add to the complexity, there is a confusing array of security solutions on the market that require time and expertise to evaluate, deploy, and maintain, and a scarcity of people with the skills to do so. The result is often a patchwork of solutions, alert overload, and security teams overwhelmed by too many cyber incidents and tools.

Many organizations, especially small to mid-sized ones, are looking to managed security services and security operations center (SOC) as a service to solve these challenges.

In this democast, we’ll discuss how SOC-as-a-Service can help, and what to look for in a modern managed security service provider (MSSP). We’ll also provide a demo of our cloud native ActiveEye platform which offers complete visibility into your cloud, endpoint, and network security, along with 24×7 expert support to detect, investigate, and resolve threats faster.

Vendor Webcast

Cracking the Zero Trust Code –  Practical ways for making your Zero Trust Security Transformation Effective

In this webinar, guest speaker Forrester’s Chase Cunningham, and AppGate’s VP of Product Jason Garbis will discuss how to make your Zero Trust security transformation effective. 

Register for Cracking the Zero Trust Code –  Practical ways for making your Zero Trust Security Transformation Effective

Sponsored by: Cyxtera

Cracking the Zero Trust Code –  Practical ways for making your Zero Trust Security Transformation Effective

Organizations are moving toward the Zero Trust model, embracing one of the greatest advancements in security in the last 10 years. Due to the amount of noise on the subject, it may be challenging to understand how real-life companies are implementing Zero Trust to solve security problems, the kind of organizations that have benefited the most from their deployments  and how they are overcoming internal constraints.

In this webinar, guest speaker Forrester’s Chase Cunningham, and AppGate’s VP of Product Jason Garbis discuss how to make your Zero Trust security transformation effective. 

 LEARN:

  • Why Forrester is urging organizations to get started and the risks associated with not doing so
  • How businesses across industries and geographies are embracing Zero Trust today 
  • Exclusive Forrester insight and practical advice to overcome internal adoption barriers

20/20 webcast

The Business Imperative of IT Asset Management

This 20/20 webcast looks into why IT asset management has become a business imperative and how today’s IT department identifies assets not only as part ofthe overall governance, risk and compliance responsibilities, but also the far-from-mundane need of securing and protecting the corporate crown jewels, as well as private and personal information stored on the corporate network —locally and in the cloud.

Register for The Business Imperative of IT Asset Management

Sponsored by: Axonius

The Business Imperative of IT Asset Management

It is hard enough today to protect all of an enterprise’s on-premise networked devices, personal devices that link to the network physically or over Wi-Fi, operational technology devices that traverse part of the IT network (lights, electronic doors, etc.), and off-premises devices from business partners and the internet of things.As companies migrate more compute-intensive applications and storage to the cloud, the number of off-prem assets is exploding.

So how can a company keep track of the myriad of computing devices that grow on a daily basis? It all comes down to the often boring task of IT asset management. Of course, we’re not just counting boxes and physical devices anymore.

This 20/20 webcast looks into why IT asset management has become a business imperative and how today’s IT department identifies assets not only as part ofthe overall governance, risk and compliance responsibilities, but also the far-from-mundane need of securing and protecting the corporate crown jewels, as well as private and personal information stored on the corporate network —locally and in the cloud.

Vendor Webcast

What Most Computer Security Defenses are Doing Wrong, and How toFix It 

Join Roger A. Grimes,KnowBe4’s Data-Driven Defense Evangelist, for this webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way.

Register for What Most Computer Security Defenses are Doing Wrong, and How toFix It 

Sponsored by: KnowBe4

What Most Computer Security Defenses are Doing Wrong, and How toFix It 

Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.But it doesn’t have to be that way!

Join Roger A. Grimes,KnowBe4’s Data-Driven Defense Evangelist, for this webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way.

Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective  and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

Roger will teach you:

·      What most companies are doing wrong, why, and how to fix it

·      An action plan to improve the effectiveness of your computersecurity defenses

·      How to create your“human firewall

DemoCast webcast

Service Account 101:How to Start Managing Your Service Accounts

How do you ensure proper management of these non-human accounts? Service Account Governance—provisioning, reviewing,and decommissioning these services—needs to be a top priority. Unfortunately, it’s virtually impossible to implement without proper tools

Register for Service Account 101:How to Start Managing Your Service Accounts

Sponsored by: Thycotic

Service Account 101:How to Start Managing Your Service Accounts

Service accounts provide access to critical applications and data but fly under the radar of IT.They are usually created ad-hoc, and you’ve got to manage hundreds or even  thousands of services running across your network, accessing equal numbers of resources. 

Services are programs that run in the background and spring into action when called on by a user, an application, or other services. As such, these accounts typically don’t have  people assigned to them, meaning there is little or no accountability. If the person who created the service account leaves, they might take the  credentials with them, posing a huge security issue.

How do you ensure proper management of these non-human accounts? Service Account Governance—provisioning, reviewing,and decommissioning these services—needs to be a top priority. Unfortunately, it’s virtually impossible to implement without proper tools

Hear from Thycotic to learn how to take control of service account sprawl to assure your service accounts are identified and managed properly. You’ll get the answers to these important questions:

  • What is the best way to create workflows for service accounts?
  • How can I delegate ownership? How/where should I be provisioning service accounts?
  • What is the best way to enforce service account governance?
  • How can I automate the review and decommissioning of these accounts?

Vendor Webcast

It’s time to get cirrus about the cloud 

Many organizations have turned to the agility of the cloud as a means of accelerating growth and streamlining operations. However, with the somewhat endless list of services and options now available, some companies could certainly find themselves straying from a well architected solution.

Register for It’s time to get cirrus about the cloud 

Sponsored by: Rapid7

It’s time to get cirrus about the cloud 

Find yourself gazing towards the cloud with roughly the same intrepidation as the Wright brothers did when they looked to the clouds? Although somewhat daunting,the public cloud has sparked an IT migration worth billions.

Many organizations have turned to the agility of the cloud as a means of accelerating growth and streamlining operations. However, with the somewhat endless list of services and options now available, some companies could certainly find themselves straying from a well architected solution.

Join Rapid7 as we explore the shift and share how to ensure you’re formulating a secure cloud approach.

DemoCast webcast

Prevent Phishing Attacks with Proofpoint’s Security Awareness Training

Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

Register for Prevent Phishing Attacks with Proofpoint’s Security Awareness Training

Sponsored by: Proofpoint

Prevent Phishing Attacks with Proofpoint’s Security Awareness Training

Description: 99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

Join our live demo to learn how to:

  • Assess your users’ susceptibility to phishing attacks as well asother cyber threats
  • Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
  • Enable your employees to report suspicious messages with a single mouse click

20/20 webcast

Risky Business

This 20/20 webcast & Special Report looks at how to unify the corporate risk practices across all levels of the organization as the CISO, the chief risk officer, and other senior executives try to normalize a very chaotic situation.

Register for Risky Business

Sponsored by: Skybox

Risky Business

Let’s face facts: it’s always about risk. Companies manage risk in a variety of ways for data and cyber security. They manage the financial risk, the supply chain risk, the reputational risk, the compliance risk, and the overall business risk. Virtually every major decision a company makes has some sort of risk associated with it.

So when we’re looking at technical issues — everything from policies and procedures to firewalls to clouds to internal networks — there is always a risk component.

This 20/20 webcast & Special Report looks at how to unify the corporate risk practices across all levels of the organization as the CISO, the chief risk officer, and other senior executives try to normalize a very chaotic situation.

DemoCast webcast

Tackle Your Hybrid Network Complexity in 2020

How can you best secure your complex hybrid network? Traditional network security approaches aren’t enough: innovation is the key. Join us to examine the security innovations that drove SC Media to name FireMon as a 2019 Industry Innovator Award Winner. 

Register for Tackle Your Hybrid Network Complexity in 2020

Sponsored by: FireMon

Tackle Your Hybrid Network Complexity in 2020

How can you best secure your complex hybrid network? Traditional network security approaches aren’t enough: innovation is the key. Join us to examine the security innovations that drove SC Media to name FireMon as a 2019 Industry Innovator Award Winner. 

In this webcast, you’ll see how FireMon’s unique security solutions empower your security team with:

  • Adaptive Automation: Intelligent, configurable network security policy automation that monitors and responds (adapts) in real-time to changes in your environment and business requirements
  • Attack Surface Reduction:Actionable insights into the key risks and vulnerabilities across your ever-changing attack surface – so you can identify and stop threats in their tracks before they materialize 
  •  Proactive Compliance: 100% trusted compliance and risk management, no matter what you discover and change in your hybrid cloud environment

You don’t have to choose between business agility and robust security. You can have it all, and this webcast will show you how.

20/20 webcast

Vendor risk management

This 20/20 webcast looks at the challenges and requirements of vendor risk management and how it could impact you and your company

Register for Vendor risk management

Sponsored by: OneTrust

Vendor risk management

CISOs certainly understand the need for corporate risk management policies and procedures, but what about having policies and procedures for your vendors? If you do not think that is a critical issue, just ask the folks at Target, the poster child for failed vendor risk management.

Many of today’s compliance regulations require vendor risk management policies and procedures – HIPAA hasits Business Associate Contracts and the EU’s GDPR has its own set of requirements for protecting user privacy – but what do you need to know about vendor risk management that you don’t know now?

This 20/20 webcast looks at the challenges and requirements of vendor risk management and how it could impact you and your company

20/20 webcast

The Case for Security Awareness Training

This 20/20 editorial webcast looks at how CISOs can augment their professional cybersecurity team and security operations center with a highly aware user base to identify and defeat potential breaches.

Register for The Case for Security Awareness Training

Sponsored by: Cofense

The Case for Security Awareness Training

It has become cliché to say that the user is the weakest link in cybersecurity. However, it is also true that the user is often the last line of defense — phishing and other potential security attacks often depend on a person clicking on a link or malware-laden file to launch an attack.

While a company might have a top notch cybersecurity operations team, without having an equally trained user base the company is essentially defending itself with one hand tied behind its virtual back.

This 20/20 editorial webcast looks at how CISOs can augment their professional cybersecurity team and security operations center with a highly aware user base to identify and defeat potential breaches.

Vendor Webcast

Phishing prevention and response strategies with proofpoint

Today, more than 80% of breaches are caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing?

Register for Phishing prevention and response strategies with proofpoint

Sponsored by: Okta

Phishing prevention and response strategies with proofpoint

Security leaders have their work cut out for them to protect against the rapidly evolving threat landscape and stay ahead of cyber criminals. While the rise in adoption of cloud-based applications serves as a catalyst for rethinking modern security, one consistency remains: email-based credential harvesting remains the most fruitful tactic for today’s threat actors.

Today, more than 80% of breaches are caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing?

Join Lucia Milica, CISO at Proofpoint and Marc Rogers, Executive Director, Cybersecurity at Okta as they share:

  • The anatomy of a phishing attack
  • Various prevention and response strategies
  • Best tools and integrations across authentication and email security

20/20 webcast

California’s own GDPR? It’s not alone

This 20/20 webcast would look at recent privacy acts across the country and how it might affect the way U.S. businesses handle privacy concerns going forward. 

Register for California’s own GDPR? It’s not alone

Sponsored by: Micro Focus

California’s own GDPR? It’s not alone

California’s Consumer Privacy Act of 2018 took effect on January 1, 2020. The law gives California residents the right to know what data companies collect about them and how that information is shared. Consumers will also have the authority to prohibit companies from selling their data.

The bill bears similarities to the EU’s General Data Protection Regulation (GDPR) but it is no clone, so even if you currently must comply with GDPR, the CCPA will be different. And, by the way, it’s not the only privacy law at the state level. 

This 20/20 webcast would look at recent privacy acts across the country and how it might affect the way U.S. businesses handle privacy concerns going forward. 

Vendor Webcast

Many ways to defeat multi-factor authentication and how to stop the bad guys

This webcast includes a (pre-filmed) hacking demo by KnowBe4’s Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security. 

Register for Many ways to defeat multi-factor authentication and how to stop the bad guys

Sponsored by: KnowBe4

Many ways to defeat multi-factor authentication and how to stop the bad guys

Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t! 

Join Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webcast where he will explore 12 ways hackers can and do get around your favorite MFA solution. 

 This webcast includes a (pre-filmed) hacking demo by KnowBe4’s Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security. 

You’ll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

  • 12 ways hackers get around multi-factor authentication
  • How to defend your multi-factor authentication solution
  • The role humans play in a blended-defense strategy

20/20 webcast

Rating Zero Trust’s Trustworthiness

This 20/20 webcast will address at some of the drivers of the zero trust model, how they impact the data and cybersecurity environments, and ultimately what it means to the companies and their own business models and corporate cultures.

Register for Rating Zero Trust’s Trustworthiness

Sponsored by: Sophos

Rating Zero Trust’s Trustworthiness

As an industry information security is slowly moving from an assumed trust model with the right credentials — login name and password — to a zero trust model where each user, device and application needs to be authenticated continually.

A big part of this transition is ensuring that the authentication is indeed authentic, both for the IT and OT environments.

This 20/20 webcast will address at some of the drivers of the zero trust model, how they impact the data and cybersecurity environments, and ultimately what it means to the companies and their own business models and corporate cultures.

20/20 webcast

The data and application security parfait

This 20/20 webcast will look at various defenses companies can employ, including enhanced identity and access management that ensures the person or device requesting data is indeed verified at multiple levels, along with layered cloud security, to protect data wherever it might reside.

Register for The data and application security parfait

Sponsored by: Micro Focus

The data and application security parfait

Experts tell us that web applications are the number one target of attacks by hackers trying to breach the corporate and cloud network. The more consumer-facing applications a company has, the greater the risk.

But it’s not just consumer apps — cloud-based business apps and data stores are at risk as well. That said, companies continue to migrate not only apps, but also their mission-critical data, to the cloud.

This 20/20 webcast will look at various defenses companies can employ, including enhanced identity and access management that ensures the person or device requesting data is indeed verified at multiple levels, along with layered cloud security, to protect data wherever it might reside.

 

DemoCast webcast

How to reduce risk and prevent account takeover

How can a user-centric approach help you prevent security incidents like Account Takeover yet keep user friction to a minimum so that it doesn’t impact conversions?  

Register for How to reduce risk and prevent account takeover

Sponsored by: Castle

How to reduce risk and prevent account takeover

Attackers continually develop more sophisticated techniques for taking over online user accounts. For security teams, there is a constant challenge. In order to build and maintain customer loyalty, providing the best user experience is a high priority. But the best user experience can leave an organization at risk.

Persistent technology gaps have made the case for a new approach. How can a user-centric approach help you prevent security incidents like Account Takeover yet keep user friction to a minimum so that it doesn’t impact conversions?  

This webcast will discuss and demonstrate:

  • ATO technology gaps with WAFs, Fraud Detection, and Adaptive Auth
  • Understanding identity, behavior and risk of users
  • Using a risk engine for measuring and responding to user risk both pre and post login
  • How to custom-design segmented user journeys based on risk tolerance

Vendor Webcast

Why ransomware remains resilient – and what to do about it!

Join us to see why ransomware still remains an unfortunate reality for organizations of all sizes, and all industries.

Register for Why ransomware remains resilient – and what to do about it!

Sponsored by: Cisco

Why ransomware remains resilient – and what to do about it!

The rise of ransomware continues with attacks doubling in 2019. Sure, cryptomining and Emotet took a lot of the spotlight in 2018 – but ransomware remains a resilient, lucrative form of attack that races to the top of attack vectors for 2019.  And it shows no signs of slowing as security professionals get their budgets ready for 2020.

Ransomware continues to evolve at an alarming rate with more sophisticated variants and hackers modifying attack methods for more even bigger payouts.  Are you at risk?

Join us to see why ransomware still remains an unfortunate reality for organizations of all sizes, and all industries.

Vendor Webcast

A cloud carol: Visiting the ghosts of cloud security, past, present, and futur

In this webcast, industry analyst Paula Musich from EMA and Ryan Davis from ExtraHop will take a Dickensian journey through cloud security past, present, and future, and offer strategies for how security teams change the future state from one of cloud stall to one of cloud as a strategic security driver.

Register for A cloud carol: Visiting the ghosts of cloud security, past, present, and futur

Sponsored by: Extrahop

A cloud carol: Visiting the ghosts of cloud security, past, present, and futur

Cloud has now been around for nearly two decades, and in that time it has altered the past, present and future and sent enterprises down a new path for how IT services are delivered and how businesses view IT resources.
 

While cloud is widely accepted as a business accelerator, it continues to haunt security teams who have gotten a “scrooge” reputation when it comes to cloud migration and adoption. 
 

In this webcast, industry analyst Paula Musich from EMA and Ryan Davis from ExtraHop will take a Dickensian journey through cloud security past, present, and future, and offer strategies for how security teams change the future state from one of cloud stall to one of cloud as a strategic security driver.

20/20 webcast

Ransomware 2020

This 20/20 webcast looks at the current state or ransomware and other email-borne attacks and provides some insights on what you can and should be doing – and perhaps not doing – to prevent attacks.

Register for Ransomware 2020

Sponsored by: KnowBe4

Ransomware 2020

As we approach a new decade on the calendar, we also are approaching new techniques and technologies being used by attackers and defenders alike.

Understanding what’s possible by the attackers helps companies build better defenses, but is it possible to guess what approach will be used next?

This 20/20 webcast looks at the current state or ransomware and other email-borne attacks and provides some insights on what you can and should be doing – and perhaps not doing – to prevent attacks.

 

MarketFocus webcast

Hype or hope: How CISOs can get more from their vendors

Join us as we share advice from some top CISOs and CIOs on how to get the results you expect and deserve from your cybersecurity vendors and products.

Register for Hype or hope: How CISOs can get more from their vendors

Sponsored by: ValiMail

Hype or hope: How CISOs can get more from their vendors

How do you feel about the performance of your cybersecurity vendors? If you’re like most security professionals, “frustrated” probably springs to mind. A recent survey of IT security professionals conducted by SC Media and research firm C.A. Walker found that dissatisfaction runs deep among cybersecurity technology buyers. Some of the common problems: Vague, unverifiable stats, over-promising but under-delivering results, a lack of data showing whether the products are actually working, and no contractual performance guarantees. 

During this webcast, we’ll reveal what many of your colleagues’ pet peeves are — and share advice from some top CISOs and CIOs on how to get the results you expect and deserve from your cybersecurity vendors and products.
You’ll learn:

  • How CISOs hold vendors accountable
  • The secret to effectively narrowing the focus of a vendor conversation
  • Tools for making smart buying decisions
  • Setting a cadence for meetings with your vendors
  • The key to getting vendors to “play nice” with each other

 

DemoCast webcast

Threat hunting in Splunk with Zeek (aka Bro)

Join us to learn how you can use Zeek logs in Splunk to answer critical questions and expand threat hunting capabilities.

Register for Threat hunting in Splunk with Zeek (aka Bro)

Sponsored by: Corelight

Threat hunting in Splunk with Zeek (aka Bro)

To conduct hunting operations, threat hunters need to make quick sense of their environment. Since nearly all attacks must cross the network, it’s an essential source of truth—yet common sources of network data such as Netflow records and DNS server logs provide minimal details and are difficult to correlate.

A better source of network data exists, however, in one of the industry’s best-kept secrets: the open-source Zeek network security monitor. Zeek (formerly known as Bro) transforms raw network traffic into high-fidelity logs that comprehensively summarize network activity across more than 35 protocols at less than 1% the size of full traffic capture–perfect for enabling fast and easy search in SIEM solutions like Splunk.

Register for this webcast to hear from Roger Cheeks, Solution Engineer at Corelight, to learn how you can use Zeek logs in Splunk to answer critical questions and expand threat hunting capabilities.

 

Vendor Webcast

Inside a docker cryptojacking exploit

Uncover recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection.

Register for Inside a docker cryptojacking exploit

Sponsored by: Threat Stack

Inside a docker cryptojacking exploit

Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes.

While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

In this webcast, we will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. We’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.

Vendor Webcast

Security fundamentals: Vulnerability management 101

We’ve gathered a panel of experts to share their knowledge and experiences with vulnerability management and lessons learned.

Register for Security fundamentals: Vulnerability management 101

Sponsored by: Rapid7

Security fundamentals: Vulnerability management 101

As modern environments evolve, your risk exposure changes by the minute. Each year, you see the amount of data grow exponentially and the threat of attacks become more sophisticated. Minimizing risk and optimizing operations are becoming more challenging. It sometimes feels like a never-ending battle, but reducing risk is possible.

For our upcoming webcast, we’ve gathered a panel of experts to share their knowledge and experiences with vulnerability management and lessons learned. In this interactive webcast, our experts will cover a variety of topics, including:

  • The basics of vulnerability management in the modern environment
  • The importance of a vulnerability management program
  • Best practices for improving your VM program
  • Tips for how your organization can securely move to the cloud

 

 

Vendor Webcast

Fundamentals of delivering secure mobile apps at scale

With digital transformation in full swing, mobile app traffic is outpacing web app traffic for most organizations. Whether businesses build mobile apps to engage with customers, streamline operations, or grow revenue, mobile app security teams are driven by the mandate to move faster to keep pace with mobile app development.

Register for Fundamentals of delivering secure mobile apps at scale

Sponsored by: Now Secure

Fundamentals of delivering secure mobile apps at scale

With digital transformation in full swing, mobile app traffic is outpacing web app traffic for most organizations. Whether businesses build mobile apps to engage with customers, streamline operations, or grow revenue, mobile app security teams are driven by the mandate to move faster to keep pace with mobile app development.  

Join this webcast to learn how the mobile app security fundamentally differs from web app security and how organizations can efficiently scale their mobile appsec programs to meet business demand. 
 
In this webcast, NowSecure Chief Mobility Officer Brian Reed will discuss: 

  • How mobile-first industry innovators are using mobile apps to drive digital transformation, forcing mobile appsec to be built in, not bolted on 
  • How mobile app security is fundamentally different from web app security, and how to successfully navigate those differences 
  • How to prioritize, standardize & scale mobile app security testing using industry best practices and standards like OWASP, CVSS, NIST, GDPR and more. 

Vendor Webcast

Minimize SOC alert fatigue and accelerate triage with insights into destructive objects

This webcast will examine what it means to inject smarter intelligence, remove the noise, and bring greater confidence into the SOC, thereby reducing dwell times and minimizing exposure to breaches and data loss. 

Register for Minimize SOC alert fatigue and accelerate triage with insights into destructive objects

Sponsored by: ReversingLabs

Minimize SOC alert fatigue and accelerate triage with insights into destructive objects

With renewed adoption of Security Operations Centers (SOCs) in response to the evolving and rapidly changing threat landscape and escalating volume of alerts, it’s becoming increasingly important to leverage threat intelligence and security analytics to accelerate SIEM triage and automate incident response.   

This webcast will examine what it means to inject smarter intelligence, remove the noise, and bring greater confidence into the SOC, thereby reducing dwell times and minimizing exposure to breaches and data loss. 

We’ll discuss how to: 

  • Apply rich contextual data to automate triage, clear queues of false positives, and rapidly convict and escalate true alerts
  • Leverage high throughput static analysis to enrich data and classify threats in support of faster prioritization, better decisions and speedier incident response
  • Augment existing Email, AV, EDR, and Sandbox security investments to close gaps, and ensure response playbooks execute properly.

 

 

Vendor Webcast

Zero Trust secure access checklist

How and where can organizations effectuate a Zero Trust security posture in order to mitigate access visibility gaps and control risks while enabling needed accessibility

Register for Zero Trust secure access checklist

Sponsored by: Pulse Secure

Zero Trust secure access checklist

No organization is immune from data breaches and exposures are on the rise. At the same time, enforcing access compliance has never been more challenging due to user, multi-cloud and IoT dynamics. 

How and where can organizations effectuate a Zero Trust security posture in order to mitigate access visibility gaps and control risks while enabling needed accessibility

Join this expert, practitioner webcast to examine: 

  • Critical elements of Zero Trust Network Access Real world process
  • Deployment and interoperability considerations
  • A pragmatic checklist for ensuring the right tools and practice
  • How to avoid user experiencemanagement overhead, and rip & replace investment issue. 

Vendor Webcast

Gearing up for 2020: Best practices to secure your remote workers

 Join us for this webcast to learn how you can improve security, simplify your security environment, and reduce the number of security tools to reduce strain on your limited resources. 

Register for Gearing up for 2020: Best practices to secure your remote workers

Sponsored by: Cisco

Gearing up for 2020: Best practices to secure your remote workers

Today’s workplaces are changing. More organizations are switching to direct internet access (DIA) at satellite offices. Users are embracing cloud apps, skipping the VPN, and enjoying the freedom to work from anywhere. But the draw of DIA creates even more gaps in security for IT.  

Security needs to evolve to secure DIA and mobile users, remote workers, and SaaS apps. With 2020 on the horizon, organizations need a better way to see and control all internet traffic. 

Join us for this webcast to learn how you can improve security, simplify your security environment, and reduce the number of security tools to reduce strain on your limited resources. 

DemoCast webcast

How to operationalize your vendor risk management program

In this webcast, we’ll help you understand the best practices to create efficiencies and mature your Vendor Risk Management processes by identifying pain points and solutions through automation, and roping in the key stakeholders that are needed to provide support when maturing your VRM program.

Register for How to operationalize your vendor risk management program

Sponsored by: SecurityScorecard

How to operationalize your vendor risk management program

In this digital age, organizations are increasingly outsourcing critical business processes to third parties. While this increases operational efficiencies, organizations might be putting their critical data at risk, further confirming the need to adopt a Vendor Risk Management program.  

 

As VRM processes are evolving at a rapid pace, the need to balance efficiency, compliance, and risk is challenging teams now more than ever. Whether an organization has a vendor or third party risk management (TPRM) program that is heavily manual with Excel, SharePoint, Email, etc., a semi-automated workflow or a fully-integrated TPRM program – there are paths to optimizing TPRM programs. 

 Join us for this webcast to: 

-Understand the best practices to create efficiencies and mature your processes. 
Identify the pain points and solutions through automation from basic to advanced. 
-Rope in the needed stakeholders to provide the support needed to mature the program. 

Vendor Webcast

Building an effective security awareness program

Join our webcast as we examine what it means to have and how to build an effective security awareness program. In this session, we’ll discuss:

Register for Building an effective security awareness program

Sponsored by: Proofpoint

Building an effective security awareness program

Implementing and sustaining a successful security awareness program can be a daunting task. Without formal policies and frameworks, many organizations are shooting in the dark when it comes to determining how often to phish and train while managing stakeholder expectations. So what can you do to help your end users better protect themselves?

 

Join our webcast as we examine what it means to have and how to build an effective security awareness program. In this session, we’ll discuss:

 

– Proven best practices for increasing the effectiveness of cybersecurity education

– How to build a culture of security within your organization

– Actionable guidance on executing security awareness & training initiatives that deliver measurable results

Vendor Webcast

Scary Vulnerabilities and Spooky Stats: The State of Software Security (SOSS) Volume 10

To commemorate the chilling 10th volume of Veracode’s flagship report, the State of Software Security (SOSS), we invite you to join this upcoming webinar featuring Chris Wysopal, CTO and co-founder of Veracode.

Register for Scary Vulnerabilities and Spooky Stats: The State of Software Security (SOSS) Volume 10

Sponsored by: Veracode

Scary Vulnerabilities and Spooky Stats: The State of Software Security (SOSS) Volume 10

To commemorate the chilling 10th volume of Veracode’s flagship report, the State of Software Security (SOSS), we invite you to join this upcoming webinar featuring Chris Wysopal, CTO and co-founder of Veracode.

Chris will share how the evolution of this report over the past 10 years demonstrates the frighteningly rapid change and growth in the application security industry, and also what has remained horrifyingly the same. In addition, he’ll take a less-scary look at the AppSec landscape and examine the best practices that are leading to some stellar fix rates. 

During this webinar, Chris will share insights into this year’s key findings including:

  • The prevalence of security debt as a result of not addressing and fixing older findings from scans
  • The impact of scan frequency and cadence on time to remediation, fix rates, and level of security debt
  • The importance of prioritizing vulnerabilities based on risk severity rather than on time of discovery

Vendor Webcast

Are you a target? New research on threats

Which threats are trending in 2019? Join us for this webcast to find out. Plus, you’ll also learn how to leverage threat intelligence to answer these pressing questions:

Register for Are you a target? New research on threats

Sponsored by: Cisco

Are you a target? New research on threats

What separates attack targets from attack victims? The answer is simple: proactive threat intelligence.
 
With emerging threats like Emotet, pervasive phishing, and relentless ransomware attacks on rise, responding to attacks when they happen is not enough. Security teams need to be able to proactively uncover and identify threats before they happen.
 
Which threats are trending in 2019? Join us for this webcast to find out. Plus, you’ll also learn how to leverage threat intelligence to answer these pressing questions:

  • Where do we focus our attention to improve detection and response times?
  • Which threats favor which industries?
  • Which tactics can identify emergent threats more quickly? 


You can take simple steps to improve threat detection and prevent your organization from becoming the next cyber security victim

Vendor Webcast

Security Fundamentals: Threat Detection & Response 101

In this webcast, the Rapid7 team will discuss key considerations for threat detection and response in modern environments that span on-premise and cloud infrastructures.

Register for Security Fundamentals: Threat Detection & Response 101

Sponsored by: Rapid7

Security Fundamentals: Threat Detection & Response 101

As more organizations start migrating to the cloud, security teams are discovering that while security best practices remain the same, cloud environments present some unique challenges that demand new approaches. To successfully manage risk in cloud environments, today’s security teams need to be able to quickly detect and remediate threats. If your organization is already fully utilizing the cloud, or just beginning the migration, this webcast will help to make sure you’re set up for success. 

In this webcast, the Rapid7 team will discuss key considerations for threat detection and response in modern environments that span on-premise and cloud infrastructures.

Discussion topics will include:

  • What’s the same—and what’s different—about on-premises and cloud threat detection?
  • How can frameworks, like MITRE ATT&CK, help teams decide where to start?
  • Where do traditional threat detection and response programs fail in the cloud?

Vendor Webcast

Fire your firewall for better segmentation

Join us and Illumio’s Dan Gould to learn about segmentation innovation that’s faster, simpler, more reliable – and cloud and DevOps-friendly. All without re-architecting the network or slowing it down with firewalls

Register for Fire your firewall for better segmentation

Sponsored by: Illumio

Fire your firewall for better segmentation

Join us and Illumio’s Dan Gould to learn about segmentation innovation that’s faster, simpler, more reliable – and cloud and DevOps-friendly. All without re-architecting the network or slowing it down with firewalls

Vendor Webcast

Network traffic analysis: Why you need it and 6 capabilities you can’t live with

Join us to hear from Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) about why NTA should be a core component of your security strategy, and what capabilities to look for. He’ll be joined by Bryan Doerr, Product Manager, Cisco Stealthwatch who will describe how to gain network-wide visibility, from on-premises to the cloud.

Register for Network traffic analysis: Why you need it and 6 capabilities you can’t live with

Sponsored by: Cisco

Network traffic analysis: Why you need it and 6 capabilities you can’t live with

Your network is becoming increasingly complex, with different types of devices, users and applications connecting from various locations. Attackers are exploiting this complexity to compromise your organization without you even knowing it! So how can you detect such threats?

Because every threat touches the network, Network Traffic Analysis (NTA) solutions that provide visibility into the behavior of every user and device on your network are becoming more popular. The best NTA solutions use advanced analytics to detect anomalies and correlate them to malicious events, so you can prevent security incidents from turning into a major breach.

Join us to hear from Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) about why NTA should be a core component of your security strategy, and what capabilities to look for. He’ll be joined by Bryan Doerr, Product Manager, Cisco Stealthwatch who will describe how to gain network-wide visibility, from on-premises to the cloud.

Vendor Webcast

Redefining privileged access management for agile cloud environments

In this webcast we’ll talk about moving from heavy-handed access control to lightweight, agile access guardrails that are built specifically for DevOps.

Register for Redefining privileged access management for agile cloud environments

Sponsored by: CMD

Redefining privileged access management for agile cloud environments

Managing privileged access inside cloud environments is completely different from the corporate environment. We love Linux because it’s so fast to build and deploy web apps, but the minute you want to put any kind of centralized security or control over that environment, you risk running DevOps into the ground.

The fact is, DevOps needs elevated access like root and sudo to deploy code and fix issues as quickly as possible. However, we also need a centralized way to manage that access so security policies are enforced on sprawling cloud hosts/containers.

In this webcast we’ll talk about moving from heavy-handed access control to lightweight, agile access guardrails that are built specifically for DevOps.

Learn how to implement:

  • Real-time user session monitoring for visibility and audit/compliance
  • Just-in-time access approvals and pre-execution blocks using 2FA or Slack/Teams

  • Threat detection and alerting for Linux based attack vectors

  • Identity-based policy for shared accounts and root-access users

Vendor Webcast

2019 Phishing by industry benchmarking

In this webcast, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

Register for 2019 Phishing by industry benchmarking

Sponsored by: KnowBe4

2019 Phishing by industry benchmarking

As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!
IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

Join Joanna Huisman, KnowBe4’s Senior Vice President of Strategic Insights and Research, for a review of the 2019 Phishing Industry Benchmarking Study, a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests.

In this webcast, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks.  Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

Do you know how your organization compares to your peers of similar size? Attend this webcast to find out!

You will learn more about:

  • New phishing benchmark data for 19 industries
  • Understanding who’s at risk and what you can do about it
  • Actionable tips to create your “human firewall”
  • The value of new-school security awareness training
Vendor Webcast

5 Tips for a Smooth SD-WAN Rollout that Includes Cloud Security to Reduce Costs and Increase Speeds

This webcast will focus on how to successfully pair cloud security with SD-WAN to create direct Internet breakouts from branch offices for lower costs and faster Internet speeds. The tips will show you how to reduce the load on SD-WAN private links so that the overall costs for a SD-WAN rollout are reduced by lowering the burden on SD-WAN equipment and firewalls.

Register for 5 Tips for a Smooth SD-WAN Rollout that Includes Cloud Security to Reduce Costs and Increase Speeds

Sponsored by: iboss

5 Tips for a Smooth SD-WAN Rollout that Includes Cloud Security to Reduce Costs and Increase Speeds

SD-WAN provides a great strategy for connecting offices over commodity Internet connections.  This reduces MPLS costs and provides a software-defined capability to intelligently route traffic between branch office locations. This is critical as bandwidth is increasing exponentially by the day.
 
However, most of the increased traffic is for cloud applications, not for servers sitting at offices.

 This webcast will focus on how to successfully pair cloud security with SD-WAN to create direct Internet breakouts from branch offices for lower costs and faster Internet speeds. The tips will show you how to reduce the load on SD-WAN private links so that the overall costs for a SD-WAN rollout are reduced by lowering the burden on SD-WAN equipment and firewalls.

 
The webcast will also show how to configure an SD-WAN direct Internet breakout from a branch office using tunnels to a cloud security provider.

20/20 webcast

Automating the cloud

In this 20/20 webcast we look at orchestration and automation — how today’s CISO can prevent attacks to cloud-based data by automating individual tasks, but also automating multiple tasks at once.

Register for Automating the cloud

Sponsored by: Rapid7

Automating the cloud

Security in the cloud isn’t quite the same as security on-prem. Cloud-based security requires greater automation than does on-prem because the infosec team doesn’t have hands-on access to the boxes themselves.

But it’s more than that — our growing dependence on the cloud is making processes more complex and challenging. Automation is more than simply finding newer and better ways to keep your data from being infected by malware — it also includes everything from incident response to risk management to threat intelligence.

 In this 20/20 webcast we look at orchestration and automation — how today’s CISO can prevent attacks to cloud-based data by automating individual tasks, but also automating multiple tasks at once.

DemoCast webcast

Shifting security right: Know what you own

There are a number of reasons unknown or unlogged web applications continue to live in portfolios- including M&A activity resulting in acquired web assets, and the proliferation of the digital landscape with marketing promotional sites. Ultimately, the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.

Register for Shifting security right: Know what you own

Sponsored by: Veracode

Shifting security right: Know what you own

It is more common than you would imagine that organizations and brands have more web applications than they realize – as many as 30 percent more than previously known in some cases.

Hear from Bipin Mistry, Director of Product Management at Veracode who will provide examples of how his team has worked with customers to uncover these hidden applications. For example, during one project for a high street bank in the UK, the team discovered 1,800 websites that had yet to be logged!

There are a number of reasons unknown or unlogged web applications continue to live in portfolios- including M&A activity resulting in acquired web assets, and the proliferation of the digital landscape with marketing promotional sites. Ultimately, the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.

Join this session to learn how to uncover unknown web applications in your portfolio to ensure their security from cyber attackers.

Vendor Webcast

Transforming your security operation center into a modernized cyber battle station

The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cyber security efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.

Register for Transforming your security operation center into a modernized cyber battle station

Sponsored by: SecureWorks

Transforming your security operation center into a modernized cyber battle station

The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cyber security efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.
 
To combat this ever-changing threat, Secureworks is leading a transformative movement to re-imagine a new, proactive SOC where faster, more precise intelligence for proactive threat hunting and automated remediation are realized.
 
Data science applied to vendor-inclusive data, multi-device telemetry, and world-class threat intelligence is the only way to transform security operations to outpace and outmaneuver the adversary and become a modernized cyber battle station for a global force of defenders.

What you will learn:

  • The definition of the SOC of the Future and the requirements available today to build it.
  • How Human-Machine intelligence, Artificial Intelligence and Advance Analytic Software give organizations an enduring advantage over the adversary.
  • Emerging analytics tools, real world use cases and software-driven solutions that are transforming the way security teams detect, investigate, and respond to unknown threats across endpoints, networks, and the cloud.
Vendor Webcast

Next-level SecOps with UEBA and MITRE ATT&CK

In this webinar, special guest Joseph Blankenship of Forrester Research will join Stephan Jou, CTO at Interset, a Micro Focus company, to explore how to use the information in the MITRE ATT&CK database to plan out and create metrics for your SecOps strategy.

Register for Next-level SecOps with UEBA and MITRE ATT&CK

Sponsored by: Interset

Next-level SecOps with UEBA and MITRE ATT&CK
Effective security operations (SecOps) requires staying ahead of quickly and constantly changing threats. MITRE ATT&CK—a living knowledge database of real-world threat tactics and techniques—can give your security team detailed information on data sources, examples, mitigation, and detection that can inform threat detection powered by user and entity behavioral analytics (UEBA). Together, ATT&CK and UEBA can connect the dots between unusual activity inside your enterprise and real, actionable security threats.

In this webinar, special guest Joseph Blankenship of Forrester Research will join Stephan Jou, CTO at Interset, a Micro Focus company, to explore how to use the information in the MITRE ATT&CK database to plan out and create metrics for your SecOps strategy. Attendees will learn:

Attendees will learn:

  • How to use the MITRE ATT&CK matrix to quantify, measure, and plan your SecOps strategy
  • Which attack tactics and techniques real-world organizations face most often
  • How anomaly detection models, combined with correlation capabilities, can be mapped to ATT&CK techniques to protect against real threats and adversaries
  • How UEBA augments existing detection capabilities to minimize the chance of serious damage from an attack

Vendor Webcast

Privileged Access Management as a Service: What’s in it for you?

As a security professional, SECaaS gives you a unique ability to play an instrumental role in driving your organization towards better, more secure and compliant operation by securing your most vulnerable area – privileged users. And doing so quickly, efficiently, and inexpensively, without the need to develop in-house expertise in privileged access management. After all, privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach.

Register for Privileged Access Management as a Service: What’s in it for you?

Sponsored by: CyberArk

Privileged Access Management as a Service: What’s in it for you?

Operating in a digital economy drives many organizations to take advantage of a SaaS consumption model when it comes to IT products. Security products are no exception, fueling a multibillion-dollar, ever-growing Security as a Service (SECaaS) market.

As a security professional, SECaaS gives you a unique ability to play an instrumental role in driving your organization towards better, more secure and compliant operation by securing your most vulnerable area – privileged users. And doing so quickly, efficiently, and inexpensively, without the need to develop in-house expertise in privileged access management. After all, privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach.

While Privileged Access Management (PAM) as a Service is not a brand-new concept, it could be critical for those organizations that simply don’t have the resources to deploy and maintain an on-prem PAM solution. PAM as a Service is a way to outsource complex security solutions needs to experts in the field while allowing internal IT and security teams to focus on core business competencies.

Join this webcast to understand what PAM as a Service can do for you. 

You will learn:

  • Security as a Service recent trends
  • Direct business-centric benefits from moving to a SECaaS approach
  • Main attack scenarios targeting privileged access
  • Privileged Access Management basics in the digital economy
  • “Privilege as a Service” concept and benefits
  • 5 key things to look for when evaluating Privileged Access Security as a Service
  • How to build a foundation for your Privilege Access Security program using PAM as a Service

Our presenters will discuss how consuming privileged access security through SaaS can help your organization save time and resources while implementing essential security controls, all without the need to manage additional infrastructure. Join us for a webcast and we will help you start this conversation with your management today.

Vendor Webcast

5 Must know tips for migrating to office 365 and cloud security while avoiding network outages and brown outs

This webcast focuses on providing key network and cloud security tips for ensuring a successful Office 365 migration while avoiding unnecessary connectivity interruptions. Areas covered include synchronizing with Office 365 signatures, ensuring cloud security doesn’t interfere with Office 365 connections and planning for fast Office 365 connections by leveraging modern cloud security platforms.

Register for 5 Must know tips for migrating to office 365 and cloud security while avoiding network outages and brown outs

Sponsored by: iboss

5 Must know tips for migrating to office 365 and cloud security while avoiding network outages and brown outs

Migrating to Office 365 is part of a big step in cloud application migration. Microsoft Office 365 enables productivity and allows access to business-critical applications from anywhere. The network requirements for Office 365 are much different from those in an on-prem world.

This webcast focuses on providing key network and cloud security tips for ensuring a successful Office 365 migration while avoiding unnecessary connectivity interruptions. Areas covered include synchronizing with Office 365 signatures, ensuring cloud security doesn’t interfere with Office 365 connections and planning for fast Office 365 connections by leveraging modern cloud security platforms.

Vendor Webcast

Achieve better, faster results by augmenting your sandbox with automated static analysis

As malware becomes increasingly sophisticated, evasive, and complex, the task of detecting and analyzing suspicious files becomes a growing challenge. We’ll demonstrate how the seamless integration across these enterprise security solutions brings greater insights into an organization’s files through the combination of static analysis and dynamic analysis from various leading sandbox solutions.

Register for Achieve better, faster results by augmenting your sandbox with automated static analysis

Sponsored by: Reversing Labs

Achieve better, faster results by augmenting your sandbox with automated static analysis

As malware becomes increasingly sophisticated, evasive, and complex, the task of detecting and analyzing suspicious files becomes a growing challenge. Recent research suggests 70% of malware goes undetected.
Good news – now organizations have a means to detect and identify malware through the combination of static and dynamic analysis.

Attend this webcast to hear how automated, high-speed static analysis can optimize your sandbox deployments by addressing the following scenarios:

  • Not all files can or will execute in the Sandbox. Static analysis decomposes numerous formats to expose each of the elements for analysis, including executables.
  • Not all files can be unpacked. Static analysis unpacks complex files to expose executables for processing.
  • The volume of suspect files can overwhelm Sandbox processing. Static analysis expeditiously processes all files and forwards only those targeted for additional analysis to the Sandbox.

We’ll demonstrate how the seamless integration across these enterprise security solutions brings greater insights into an organization’s files through the combination of static analysis and dynamic analysis from various leading sandbox solutions.

Vendor Webcast

Detecting common threats in the cloud

To successfully manage risk in cloud environments, today’s security teams need to be able to quickly detect and remediate threats. If your organization is already fully utilizing the cloud, or just beginning the migration, this webcast will help to make sure you’re set up for success.

Register for Detecting common threats in the cloud

Sponsored by: Rapid7

Detecting common threats in the cloud

To successfully manage risk in cloud environments, today’s security teams need to be able to quickly detect and remediate threats. If your organization is already fully utilizing the cloud, or just beginning the migration, this webcast will help to make sure you’re set up for success.

Join Rapid7 expert, Alan Foster, Senior Security Solutions Engineer, as he walks you through:
 

  • The role that AWS solutions like GuardDuty and CloudTrail play in detecting threats
  • The importance of centralizing all logs and how you can do so easily
  • How to detect suspicious activity in your AWS environment
Vendor Webcast

How to prevent 81% of phishing attacks from sailing right into your inbox with DMARC

In this webcast, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

Register for How to prevent 81% of phishing attacks from sailing right into your inbox with DMARC

Sponsored by: KnowBe4

How to prevent 81% of phishing attacks from sailing right into your inbox with DMARC

Only ~20% of companiesuse DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which couldsignificantly cut down on phishing attacks. But even when they are enabled andyour domain is more secure, 81% of phishing attacks still continue to sailright through to the end-user.

In this webcast, RogerGrimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enableDMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing stillmight get through to your inbox and what you can do to maximize your defenses.

What you’ll learn:

  • How to enable DMARC, SPF, and DKIM
  • Common configuration mistakes
  • How to best configure DMARC and other defenses to fight phishing
  • Techniques to empower your users to identify and avoid phishingattempts that make it through your surface-level defense

20/20 webcast

The DevSecOps express

The Dept. of Homeland Security says 90 percent of vulnerabilities come from problems with software. Even a modest improvement in application security could result in a significant reduction in the threat to corporate networks. But some experts believe that DevOps alone is insufficient. This 20/20 webcast looks at how DevSecOps impacts the software development life cycle and what CISOs need to know about how to implement it.

Register for The DevSecOps express

Sponsored by: Veracode

The DevSecOps express

Application security is taking center stage these days as CISOs and CIOs try to determine how best to limit network vulnerabilities.

The Dept. of Homeland Security says 90 percent of vulnerabilities come from problems with software. Even a modest improvement in application security could result in a significant reduction in the threat to corporate networks. But some experts believe that DevOps alone is insufficient.

This 20/20 webcast looks at how DevSecOps impacts the software development life cycle and what CISOs need to know about how to implement it.

Vendor Webcast

Why It’s Time to Kill Your VPN

Technology created in 1996 is antiquated and needs to be replaced. VPNs are dangerous and never intended to secure today’s hybrid, mobile and on-demand IT. Join this webcast to hear why you might want to replace their VPN with SDP and the immediate benefits you’ll realize for doing so. We will also share a real world example of the benefits of replacing VPN.

Register for Why It’s Time to Kill Your VPN

Sponsored by: Cyxtera

Why It’s Time to Kill Your VPN

Technology created in 1996 is antiquated and needs to bereplaced. VPNs are dangerous and never intended to secure today’s hybrid,mobile and on-demand IT.

Furthermore, they create complexity, distracting high-skillsecurity and network professionals with mundane, unnecessary tasks. It’s timeto kill your VPN and replace it with a better approach to secure access, theSoftware Defined Perimeter (SDP).

Join this webcast to hear why you might want to replacetheir VPN with SDP and the immediate benefits you’ll realize for doing so. Wewill also share a real world example of the benefits of replacing VPN.

Vendor Webcast

Lessons from the field: How are skilled testers infiltrating?

In this webcast you will hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

Register for Lessons from the field: How are skilled testers infiltrating?

Sponsored by: SecureWorks

Lessons from the field: How are skilled testers infiltrating?
Many organizations perform regular annual or bi-annual testing to identify network vulnerabilities, gaps in their controls and satisfy industry compliance requirements. Examining results and lessons learned can be limited.

However, wouldn’t it be nice to see what tactics and techniques some of the most skilled testers out there are utilizing across all industries, all levels of maturity and to serve a variety of different objectives?  Join this webcast for an opportunity to see how good guys simulate the bad guys and gain valuable insights.

In this webcast you will hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.

Key topics covered include:
  • Examples of real-world engagements
  • Tactics and techniques commonly used to achieve their objectives
  • Trends and weaknesses seen in defenses 
  • Insights and lessons learned 

20/20 webcast

Open source threat intelligence comes of age

This 20/20 will look at trends in open source threat intelligence and how we can take advantage of these advancements. It is not that threat intelligence is new that makes a difference today; it is that it is becoming the norm rather than the exception. Not only that, threat intelligence also is becoming more diverse and distinctive.

Register for Open source threat intelligence comes of age

Sponsored by: Netscout

Open source threat intelligence comes of age

It is not that threat intelligence is new that makes a difference today; it is that it is becoming the norm rather than the exception. Not only that, threat intelligence also is becoming more diverse and distinctive. Gone are the days when companies relied strictly on data feeds of threats that were known. Today we are seeing an expansion of threat intel that pulls together customized threats for specific industries, open source threat intel, and a vast array of data about emerging threats. This 20/20 will look at trends in open source threat intelligence and how we can take advantage of these advancements.

Vendor Webcast

Is the cloud transforming security?

hear from security experts as they share insights on why every business should focus on transforming their security to support any cloud transformation journey. Explore how remote browser isolation is helping customers transform security while simultaneously helping to enable cloud transformation.

Register for Is the cloud transforming security?

Sponsored by: Menlo Security

Is the cloud transforming security?

Everyone is moving to the cloud. It’s faster, scalable, seamless/agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

Given this paradigm, hear from security experts as they share insights on why every business should focus on transforming their security to support any cloud transformation journey. Explore how remote browser isolation is helping customers transform security while simultaneously helping to enable cloud transformation.

We will share:

  • How IT teams are adopting a ‘Cloud First’ attitude and how security should be part of this movement
  • Why Isolation is a fundamentally different approach that is transforming enterprise security architecture
  • Core differences that enable us to deliver Isolation from the cloud?

Vendor Webcast

Hacking your organization: 7 steps bad guys use to take total control of your network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

Register for Hacking your organization: 7 steps bad guys use to take total control of your network

Sponsored by: KnowBe4

Hacking your organization: 7 steps bad guys use to take total control of your network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:

  • How detailed data is harvested using public databases and surprising techniques
  • Tricks used to craft a compelling social engineering attack that your users WILL click
  • Cunning ways hackers deliver malicious code to take control of an endpoint
  • Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it’s too late.

Vendor Webcast

Beyond the phish: A snapshot of end-user behavior

During this webcast, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications. 

Register for Beyond the phish: A snapshot of end-user behavior

Sponsored by: Proofpoint

Beyond the phish: A snapshot of end-user behavior

Phishing is one of InfoSec’s longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering? 

During this webcast, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications. 

We’ll share: 

  • The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering 
  • The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries 
  • A more holistic view of susceptibility by looking beyond knowledge assessments and training activities 
  • How you can use this information to reduce the risk of successful cyberattacks within your organization 

20/20 webcast

Digital transformation as risk management

Marketers call it “digital transformation.” Really it is just another component of risk management, but this time it focuses on such technologies as AI, cloud and fog computing, mobile devices, and the internet of things.

Register for Digital transformation as risk management

Sponsored by: ServiceNow

Digital transformation as risk management

Marketers call it “digital transformation.” Really it is just another component of risk management, but this time it focuses on such technologies as AI, cloud and fog computing, mobile devices, and the internet of things.

While buzzwords might sell products, the CISO and their respective security teams are less interested in shiny new things as they are taking care of the business of protecting data, intellectual property, and keeping bad actors from violating the sanctity of the corporate network — be it on prem or off.

Vendor Webcast

Your ultimate guide to phishing mitigation

This webcast, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!

Register for Your ultimate guide to phishing mitigation

Sponsored by: KnowBe4

Your ultimate guide to phishing mitigation

 
Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

This webcast, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!

Strategies include:
– Developing a comprehensive, defense-in-depth plan
– Technical controls all organizations should consider
– Gotchas to watch out for with cybersecurity insurance
– Benefits of implementing new-school security awareness training
– Best practices for creating and implementing security policies







Vendor Webcast

Neutralize phishing attacks with actionable insights

Attend this webinar to hear how investigation and analysis tools can help SOC analysts to triage email-based alerts faster and more accurately. We’ll show examples of manual investigation and automated email classification, and also introduce the benefits of destructive object visibility in high-volume email analysis use cases.

Register for Neutralize phishing attacks with actionable insights

Sponsored by: Reversing Labs

Neutralize phishing attacks with actionable insights

Reports cite that 92% of malware comes through email, and it is the largest source of organizational data loss, so it’s easy to understand that 32% of breaches involved phishing. There are a number of reasons why this is happening: detection rates are too low (from email gateways, abuse boxes and EDR), detailed info is lacking to quickly triage attacks, the SOC is usually overloaded with Alerts, and there is a substantial skills gap.
 
Attend this webinar to hear how investigation and analysis tools can help SOC analysts to triage email-based alerts faster and more accurately.  We’ll show examples of manual investigation and automated email classification, and also introduce the benefits of destructive object visibility in high-volume email analysis use cases.





DemoCast webcast

Removing the “NO!” from innovation

When you talk about security automation, it means different things to different people. Does this mean that organizations should automate everything immediately? And, even if they want to: could they? 

Register for Removing the “NO!” from innovation

Sponsored by: FireMon

Removing the “NO!” from innovation
In the digital age, many see the risk of not getting new application services or changes to market fast enough equal to or greater than the risk of a costly breach.  While most security teams don’t want to put the ‘no’ in innovation, they are challenged to keep up with a significant increase in change requests, number of devices to manage and the stress of improving SLAs allowing modern app developers the ability to release new services in a timely fashion.  
 
To get ahead, enterprises must orchestrate security processes and automate mundane security tasks. When you talk about security automation, it means different things to different people. Does this mean that organizations should automate everything immediately? And, even if they want to: could they? 
 
Automation of global security policy management gives security teams parity with the speed of business innovation. In this webcast we will cover:   
  • Triggers of automation (response to: 1) a new app or service, 3) routine changes in an app or a service, 3) a new security threat)
  • Use cases for automation in policy management (e.g., automating gold standard best practices or global overarching rules, and rapid approval processes to ensure speed of deployment)
  • How an automated global security policy management framework can help organizations leverage innovation without introducing security and compliance risk

20/20 webcast

Are you and your cloud provider ready for today’s threats – or tomorrow’s?

This 20/20 webcast looks at how threat management is changing and why the security model that worked great just a few years ago might well be insufficient to meet today’s threat landscape.

Register for Are you and your cloud provider ready for today’s threats – or tomorrow’s?

Sponsored by: Rapid7

Are you and your cloud provider ready for today’s threats – or tomorrow’s?

We live in a world where clouds are getting bigger, data is moving faster, and threats now attack your cloud provider at the speed of light. 

Unfortunately, many cloud providers still defend against these massive, new threats as though it were 2014. The landscape of data threats is changing; is your company prepared? 

This 20/20 webcast looks at how threat management is changing and why the security model that worked great just a few years ago might well be insufficient to meet today’s threat landscape.



Vendor Webcast

Asset management: The Toyota Camry of cyber security

Join us and Axonius to talk about one of the biggest problems organizations face today.

Register for Asset management: The Toyota Camry of cyber security

Sponsored by: Axonius

Asset management: The Toyota Camry of cyber security

Asset Management – it’s not the most exciting thing in the world. In an industry with technologies like automation, machine learning, and AI, asset management doesn’t get a whole lot of attention, but it’s foundational and one of the biggest problems organizations face today.

Security teams’ jobs continue to get exceedingly difficult, but they’re still spending time trying to figure out where things are and what they are. You’ll see how companies are able to automate asset management to:
-Get a credible, comprehensive asset inventory
-Uncover security solution coverage gaps
-Automatically validate and enforce security policies
-Join this free webinar on Friday, June 28th at 2:00 PM ET with SC Magazine’s 2019 Rookie Security Company of the Year, Axonius.



DemoCast webcast

Advance your threat hunting and incident response

Join us and Carbon Black for a live demo to discover what happened at every stage of an attack with intuitive attack chain visualizations, uncover advanced threats, minimize attacker dwell time, prevent lateral movement and much more.

Register for Advance your threat hunting and incident response

Sponsored by: Carbon Black

Advance your threat hunting and incident response


Today, attackers can compromise your environment in an hour or less however, you have the power to respond and remediate in real time, stopping active attacks and repairing damage quickly. Investigations that typically took days or weeks can be completed in just minutes. CB ThreatHunter correlates and visualizes comprehensive information about endpoint events, giving you greater visibility into your environments.

Join us for a live demo to:

  • Discover what happened at every stage of an attack with intuitive attack chain visualizations
  • Uncover advanced threats, minimize attacker dwell time, and prevent lateral movement
  • Automatically collect and store detailed forensic data for post-incident investigation
  • Use the platform’s open APIs and out-of-the-box integrations to correlate data across your security stack

Vendor Webcast

The AppSec kill-chain evolved – TTPs for modern defenses

In this webcast, we will take a lifecycle approach to understanding web app attacks, share examples of the tools and techniques used in each phase, and the defenses security teams can employ to protect their applications.

Register for The AppSec kill-chain evolved – TTPs for modern defenses

Sponsored by: Threat X

The AppSec kill-chain evolved – TTPs for modern defenses

New and popular frameworks such as MITRE ATT&CK have aided organizations in extending their previous kill-chain models to be more focused on the actual tactics, techniques, and procedures (TTPs) that attackers are using in the real world. And while MITRE ATT&CK was originally designed for Windows-based enterprise networks, the same concepts can apply to application security.

In order to properly defend against adversaries, an organization must be aware of the specific TTPs used at each phase of an attack.

In this webcast, we will take a lifecycle approach to understanding web app attacks, share examples of the tools and techniques used in each phase, and the defenses security teams can employ to protect their applications.

This will include an analysis of:

  • Attacker preparations and anonymity
  • Enumeration and Scanning
  • Gaining credentialed access to applications and accounts
  • Exploitation and detection evasion
  • Abuse of APIs
  • Pivoting to do damage after an exploit

Vendor Webcast

DDI data – a critical enabler of SOAR

Join us to learn more about one of the key sources of contextual network and threat intel data comes from infrastructure that organizations already rely on for connectivity – DNS, DHCP and IPAM. This data along with timely, reliable and accurate threat intel can be used to improve scoring and investigation, assist in prioritizing incoming incidents, and can be relied upon to build automation.

Register for DDI data – a critical enabler of SOAR

Sponsored by: Infoblox

DDI data – a critical enabler of SOAR

Constantly evolving threats and shortage of qualified cybersecurity professionals have led security teams to move to security workflow automation to meet the demands.  It’s not enough to have a great tool nowadays. These tools have to work better together to meet today’s security challenges. Security orchestration, automation and response (SOAR) tools improve efficiency and efficacy of security operations by automating threat intel management, event monitoring and incident response processes.  

One of the key sources of contextual network and threat intel data comes from infrastructure that organizations already rely on for connectivity – DNS, DHCP and IPAM. This data along with timely, reliable and accurate threat intel can be used to improve scoring and investigation, assist in prioritizing incoming incidents, and can be relied upon to build automation

Join this webcast to learn how a well architected DNS, DHCP and IPAM can power SOAR platforms to

  • Block/unblock domains using context
  • Enrich other security tools with valuable IPAM data
  • Enhance and improve incident response with better threat intelligence

Vendor Webcast

GDPR to California Privacy – Managing cloud vendor risk

In this webcast, you’ll learn how to implement successful vendor risk processes, expedite vendor onboarding, and hear practical advice to automate vendor risk management within a software technology platform.

Register for GDPR to California Privacy – Managing cloud vendor risk

Sponsored by: OneTrust

GDPR to California Privacy – Managing cloud vendor risk

Managing vendor risk is a continuous effort under GDPR, California CCPA and other global regulations.

As organizations continue to improve their privacy and security programs, streamlining 3rd and 4th party vendor risk has become a priority.

In this webcast, you’ll learn how to implement successful vendor risk processes, expedite vendor onboarding, and hear practical advice to automate vendor risk management within a software technology platform.

DemoCast webcast

Gaining complete visibility of your environment with attack surface monitoring

Join Rapid7 and SC Media for an in-depth look into Attack Surface Monitoring with Rapid7’s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7’s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

Register for Gaining complete visibility of your environment with attack surface monitoring

Sponsored by: Rapid7

Gaining complete visibility of your environment with attack surface monitoring

Join Rapid7 and SC Media for an in-depth look into Attack Surface Monitoring with Rapid7’s Project Sonar research and industry reports. Learn how data from these sources can be leveraged in Rapid7’s industry-leading vulnerability management solution, InsightVM, to provide complete visibility into your environment.

During this webinar, you’ll learn about:
-The importance of having complete visibility of both your organization’s known and unknown assets
-Rapid7’s unique research project, Project Sonar, that regularly catalogs the public internet
-Industry reports released by Rapid7 based on data from Project Sonar, among other sources
-How data from Project Sonar can be leveraged within Rapid7’s industry-leading vulnerability management tool, InsightVM

Vendor Webcast

Risk-based adaptive DevSecOps

Join us and Synopsys to learn how the adaptive pipeline can help you rank risks, identify changes, and improve responsiveness, how to accelerate deployment to production without compromising security and four models you can implement to help align your people, process, and technology.

Register for Risk-based adaptive DevSecOps

Sponsored by: Synopsys

Risk-based adaptive DevSecOps

Building security automation into the DevOps pipeline is a key pain point for many organizations. Some firms deploy to production as frequently as every five minutes—a velocity that security struggles to match.

Implementing intelligence within the DevOps pipeline supports security activities by matching the team’s velocity, providing intelligent feedback, and supporting organizations as they scale their security testing activities.

A risk-based adaptive pipeline can close the gap between DevOps and security teams, helping DevOps teams accelerate deployment to production without compromising security.

In this webcast, you’ll learn:
– How the adaptive pipeline can help you rank risks, identify changes, and improve responsiveness
– How to accelerate deployment to production without compromising security
– Four models you can implement to help align your people, process, and technology



20/20 webcast

Is your cloud security up to snuff?

This 20/20 webcast looks at how you can ensure that your cloud storage security meets or exceeds any regulatory and corporate governance requirements. Remember: Your data is your responsibility.

Register for Is your cloud security up to snuff?

Sponsored by: Rapid7

Is your cloud security up to snuff?

As corporations move their applications, data storage and operations to the cloud, the first question the CISO should ask is: Is our cloud as secure as we can make it?

Depending on the cloud provider’s basic services is not enough; the data is yours and it’s your job to make sure you have all the components in place that you could have on your on-prem data center.

This 20/20 webcast looks at how you can ensure that your cloud storage security meets or exceeds any regulatory and corporate governance requirements. Remember: Your data is your responsibility.

Vendor Webcast

Aligning security with the flow and storage of information

Join us and OpenText™ Senior Director of Product Marketing, Hope Swancy-Haslam, as she interviews experts Anthony Di Bello, OpenText vice-president of strategy, and Judy Branham, Aon Cyber managing director on Aligning Security with the Flow and Storage of Information.

Register for Aligning security with the flow and storage of information

Sponsored by: OpenText

Aligning security with the flow and storage of information


Today’s cyber-attackers, armed with better tools and techniques at their disposal, are more effective than ever at compromising endpoints and finding their way into business IT systems.

Research shows only 53 percent of incident response teams are “mature” in their ability to effectively respond when an event occurs.  It is imperative for security teams to stay current on the latest methodologies and approaches for endpoint detection and response.

Learn how to manage vulnerability issues and apply forensic-grade security best practices. Join OpenText™ Senior Director of Product Marketing, Hope Swancy-Haslam, as she interviews experts Anthony Di Bello, OpenText vice-president of strategy, and Judy Branham, Aon Cyber managing director on Aligning Security with the Flow and Storage of Information.

Discussion will include:

  • The convergence of risk, security, and legal teams around security issues
  • The application and value of a “zero trust” approach in endpoint security
  • The importance of aligning security to the flow and storage of information
  • How teams can be more effective by understanding sensitive data and its location
  • What it means and why it makes sense to bring security closer to protected information 
  • Forensic security methodologies to apply in every environment

Vendor Webcast

Rethink infrastructure access: Traditional methods aren’t cutting it

Join us to learn how to effectively secure server access by applying the core principles of Zero Trust and enforce strict just-in-time, least privilege access in a manner that doesn’t get in the way of productivity.

Register for Rethink infrastructure access: Traditional methods aren’t cutting it

Sponsored by: Okta

Rethink infrastructure access: Traditional methods aren’t cutting it

As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic infrastructure environment requires smart access controls; but how do you adhere to your security policies without limiting automation?

Join us to learn how to effectively secure server access by applying the core principles of Zero Trust and enforce strict just-in-time, least privilege access in a manner that doesn’t get in the way of productivity.

Featured guest Dr. Chase Cunningham, principal analyst for Forrester Research, and Ivan Dwyer from Okta will discuss:
 -Why you need to re-think your infrastructure access approach
 -Why identity is the cornerstone of securing server access
 -How to put Zero Trust in practice across the infrastructure layer
 -Why secure server access is a strong “tip of the spear” use case for larger Zero Trust initiatives

DemoCast webcast

How to scale your dynamic analysis program

Join us for this democast to learn how to implement a dynamic analysis program that meets these four key criteria: Scalability, discovery, speed and automation & integration

Register for How to scale your dynamic analysis program

Sponsored by: Veracode

How to scale your dynamic analysis program

Web applications continue to be the primary attack vector for hackers looking to breach organizations, and applying dynamic application security testing (DAST) gives you security assurance for how your application will perform in the real world. The key is applying it to your organization’s entire application portfolio without slowing down delivery.

What will you learn?

Dynamic analysis is an important solution in a mature application security program because this form of testing more easily unearths different kinds of vulnerabilities, including information leakage, cryptographic issues, and cross-site scripting. You know that it is important to secure all of your organization’s web applications – including the ones you did not know you owned – while ensuring speed to market to meet customer demands and expectations.

Scalability: The ability to scan multiple applications at once – whether they are authenticated or unauthenticated – to keep security from being a bottleneck.Discovery: Uncover every web application associated with your organization, even if you did not create it in-house, to create an exhaustive inventory.Speed: Deliver high-quality results quickly, and in a smart way that saves time. Automation & Integration: Scans that run automatically and integrate with existing processes and tools keep your security and development teams moving quickly

Join us for this democast to learn how to implement a dynamic analysis program that meets these four key criteria:

-Scalability: The ability to scan multiple applications at once – whether they are authenticated or unauthenticated – to keep security from being a bottleneck.
-Discovery: Uncover every web application associated with your organization, even if you did not create it in-house, to create an exhaustive inventory.
-Speed: Deliver high-quality results quickly, and in a smart way that saves time.
-Automation & Integration: Scans that run automatically and integrate with existing processes and tools keep your security and development teams moving quickly.




Vendor Webcast

Uncovering advanced persistent threats

Join us for a step-by-step walk through of how the Operation Cloud Hopper attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10’s attack before the breach occurs.

Register for Uncovering advanced persistent threats

Sponsored by: Carbon Black

Uncovering advanced persistent threats

In one of the largest ever sustained global cyber espionage campaigns known as Operation Cloud Hopper, a Chinese threat actor group dubbed APT10 was able to infiltrate managed IT service providers to gain unprecedented access to their clients’ intellectual property and sensitive data. Leveraging “Red Leaves” malware, attackers were able to breach and freely move about laterally in their unsuspecting victims’ environments.

Join us and Tristan Morris, cybersecurity strategist at Carbon Black, as he walks us step-by-step through how the attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10’s attack before the breach occurs.

We will cover:

  • Why threat hunting is so critical today
  • How new intel can kick off a threat hunt
  • How to quickly hunt across your enterprise
  • How to scale your future threat hunts leveraging automation

Vendor Webcast

What keeps IT pros like you up at night

With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?

Register for What keeps IT pros like you up at night

Sponsored by: KnowBe4

What keeps IT pros like you up at night

As corporations move their applications, data storage and operations to the cloud, the first question the CISO should ask is: Is our cloud as secure as we can make it?

Depending on the cloud provider’s basic services is not enough; the data is yours and it’s your job to make sure you have all the components in place that you could have on your on-prem data center.

This 20/20 webcast looks at how you can ensure that your cloud storage security meets or exceeds any regulatory and corporate governance requirements. Remember: Your data is your responsibility.

Vendor Webcast

Turn your phishing links into read only

Join us to see how Isolation can help you eliminate malware and improve productivity of your employees.

Register for Turn your phishing links into read only

Sponsored by: Menlo Security

Turn your phishing links into read only

99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

In this webcast, attendees will learn:
-How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
-Need an additional layer other than a sandbox waiting for patient zero
-The ease of deploying isolation without interfering with user experience in 10 minutes

Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.