Cybersecurity Webcast Calendar

October
5
2:00 PM ET
Cybercast
A new Global Incident Response Threat Report from VMware has identified five burgeoning trends that cybersecurity leaders and professionals must get ahead of, if they wish to keep their heads above water: Deepfakes are becoming mainstream cybercriminal toolsBurnout rates among cyber professional...
November
Cybercast
The growing number of cloud-based SaaS applications that employees are using to conduct their day-to-day business is dramatically expanding their companies’ attack surface. And malicious actors are increasingly infiltrating networks by compromising weak credentials used across various cloud applica...
Cybercast
The API attack surface grows larger and more complex every day – leaving organizations uncertain of how to navigate this unfamiliar and dangerous territory. Such confusion leaves businesses vulnerable to botnet attacks against APIs that could result in a denial-of-service scenario or user account t...
Cybercast
The cloud has turned security as we know it on its head. It looks and operates differently from the familiar data center, and traditional security practices don’t fully cover the cloud. The cloud attack surface is different as well, and so are the patterns used when cloud environments are attacked....
Cybercast
What makes a Privileged Access Management (PAM) solution truly comprehensive, end-to-end, and modernized? Without truly understanding how to harness the power of PAM, organizations could leave themselves open to attacks on assets that typically require special user access. This webcast will exam...
Cybercast
Today’s hybrid workforces have introduced additional security risks to their employers. Whether working from home or while traveling, employees need the same quality of protection and control as when they are on site. Consequently, organizations must ensure a consistent employee experience when con...
Democast
Cloud native development has changed the way developers both build and secure applications. It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. One way to balance these needs is to...
Democast
In 2018, Palo Alto CTO Nir Zuk coined the term XDR – extended detection and response. Since then, the market for this security toolset – designed to unify, correlate and prioritize threat information gathered across all network data points – has taken on a life of its own. Now, organizations are hu...
Cybercast
Security assessment questionnaires are no longer the centerpiece of third-party risk management programs. As our third-party ecosystems become more diverse and dynamic, so too should our way of monitoring and collaborating with these critical business partners.Join Caitlin Gruenberg, Director of So...
Cybercast
Look inside most business organizations and you’ll find that their endpoint environments have become increasingly complex, divergent and fragmented – with a proliferation of workstations, mobile and IoT devices, containers, servers, cloud platforms and virtual machines. And remote workforce policie...
Cybercast
Supply chain-based cyberattacks are one of the biggest threats facing companies in 2022. What decisions would you make if you were the software development company whose third-party library had been targeted, potentially impacting its entire downstream customer supply chain? In this interactive ...
Cybercast
Your IT department and security department may both work for the same company, but due to opposing objectives, they don’t always act like they’re on the same team. Each unit has its own priorities, and its own set of point solutions for managing endpoints. This can lead to dangerous silos dev...
Cybercast
Cyberattacks make the news practically every day. But some headlines – like the SolarWinds incident and the ProxyShell and Log4Shell exploits – have global, far-reaching consequences that can affect many downstream organizations. It’s enough to trigger panic in your CEO and board, who may be asking...
Cybercast
Organizations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defenses and going after organizations’ data. That’s why data security ...
Cybercast
As more organizations adopt multi-cloud strategies, security managers must develop a strategy to consistently protect web applications across hybrid environments, while preserving quality of security and operational efficiency. The traditional approach to application security no longer works in the...
Cybercast
When it comes to developing strong security hygiene habits, it’s easy to talk a big game. But consistently executing on these practices is another ballgame entirely. Even the simplest of tasks can become unwieldly as a company’s IT assets scale in size. Nevertheless, businesses can take significant...
Democast
Timely threat detection is essential. Every second that a malicious actor lingers inside your network, the odds increase that your organization could be the victim of a major malware attack. Nation-state APT actors are especially adept at staying hidden – but if you know what TTPs and IOCs to look ...
Cybercast
The SolarWinds and Kaseya attacks. Log4Shell and ProxyShell… These are the headlines that give security professionals nightmares. To survive the dizzying pace of today’s modern threat landscape, organizations must have in place an action plan that allows them to quickly triage security incide...
Cybercast
Security practitioners have many different initiatives demanding their time: evaluating and mitigating 3rd party risk, enabling strategic business efforts, implementing zero-trust practices, and supporting compliance activities, to name just a few. Often overlooked in these initiatives is a securit...
Cybercast
You’ve completed a pen test and, not surprisingly, the offensive security exercise turned up multiple weak points and exploitable vulnerabilities across your enterprise environment.  Now what? How do you do ensure your pen test results are actionable and that you get the support from leader...
Cybercast
The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that window, there are key moments where the attackers take an action that might alert you to their presence. If you notice it, then you can mitigate the attac...
Cybercast
The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, companies are also taking steps toward securing their supply chains. And they are now facing many of the same struggles that government bodies have endure...
Cybercast
Ransomware actors are always evolving their techniques. This is especially true now, considering the increased use of legitimate applications and LOLBins (Living off the Land binaries.), combined with the recent emergence of major exploits such as Log4Shell, ProxyLogon and PrintNightmare. Join this...
Democast
In today’s distributed environment where new threat vectors and vulnerabilities emerge daily, it’s no longer sufficient to prioritize remediation based on a CVSS score. Tanium brings together numerous sources of risk (e.g. vulnerabilities, compliance gaps, sensitive data exposure, and excessive adm...
Cybercast
Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, built-in ability to prioritize alerts based on the risk level specific to an organization’s business. VDR aut...
Cybercast
How do you build trust without boundaries? With multi-cloud and remote work policies taking hold, security focus has shifted from protecting the perimeter to securing everything using trusted identities. In this new reality, public key infrastructure (PKI) is an essential building block.There’s jus...
Cybercast
The notion of “shifting left” refers to organizations conducting security testing earlier in a standard linear development process. But there’s a catch: Modern DevSecOps is very much not linear — as there should be robust testing in both staging and production environments. ...
Cybercast
Which authentication methods should we use? This is one of the most common questions you’ll need to address as you roll out multi-factor authentication (MFA) across your organization. It’s critical to build a holistic MFA strategy that utilizes the right methods in the right places. While ...
Cybercast
Cloud service platforms, like AWS, make infrastructure deployment easier for developers. In practice, organizations tend to expose their instances on the cloud network far more than is actually necessary. Unit 42 Threat Researchers analyzed hundreds of public cloud accounts during the pandemic and ...
Cybercast
It can be tough deciding how much automation you want to introduce into a particular IT security function. While automation does bring speed and efficiency, companies sometimes like to rely on human judgment for important security decisions. This debate is certainly true for third-party risk manage...
Cybercast
Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems. Once an issue that affected IT infrastructure only, now ransomware can target control processing, logistics, distribution, and delivery of critical goods. Ransomware adversaries employ cr...
Cybercast
Zero trust is an approach to security that moves defenses from statically defined network perimeters to explicitly identified assets and users. The transition to zero trust is a journey, not a product—and most organizations already have many elements of a zero trust architecture in their enterprise...
Cybercast
Despite the hype around Zero Trust, many organizations still struggle to implement it, according to responses to a CyberRisk Alliance Business Intelligence survey. Of the 300 IT security professionals who responded, only 35% are familiar with the principles of Zero Trust and only 36% have implement...
Cybercast
Cybercriminals may have launched a few less DDoS attacks in 2021, but after the extraordinary rise during the pandemic, the attacks (still 14% more than pre-pandemic) continue to evolve with new strategies for disrupting networks and extorting targets. Adversaries continue to evolve in parallel to ...
Cybercast
Software engineers and code developers face a unique set of password management challenges that can put organizational secrets in danger. Technical teams must take care to avoid embedding credentials, SSH keys, DevOps secrets and other confidential secrets into their code. Moreover, these workers c...
Cybercast
These days, improving security is fraught with challenges. Your attack surface keeps changing. You likely have vulnerabilities hiding in assets you don’t even know exist. And convincing people to remediate vulnerabilities after you identify them is harder than it should be – oftentimes, they won’t ...
Cybercast
As ransomware attacks become increasingly targeted and damaging, infected businesses run the risk of having their data held hostage and their network operations disrupted for days or even weeks. The danger has never been more real – and there are no more excuses: Organizations must understand the c...
Cybercast
The process of signing up a new customer has opposing objectives at play. On one hand, you want to ensure the account sign-up process is quick and painless for legitimate users. But you also want to have enough safeguards in place to weed out fraudsters, identity thieves, and bots who attempt to cr...
Cybercast
How do you manage your security portfolio? Do you use regulatory frameworks as a basis? As a target? Experience shows that these frameworks are an important starting-off point but should not be considered the targeted end-state. How confident are you that your controls will function correctly du...
Cybercast
4.5 million people have quit their jobs during the pandemic1. It’s the reason why 73% of CEOs surveyed cite labor and skills shortages as their top concern in 20222. Businesses are turning to third-party workers to fill the talent gap – and these users often need the same access to systems an...
Democast
When it comes to reacting to a security threat, no one has time for another assessment. Join CyberGRX experts Gary Phipps, VP of Solutions Engineering, to learn how you and your third parties can defend yourself differently in the face of a cyber attack. We’ll talk about a new way to respo...
Cybercast
Ransomware is a big business. Attacks are becoming more sophisticated, and extortion is the name of the game when it comes to extracting payments from targets. These types of threats, combined with increased supply chain vulnerabilities, require a more proactive approach to securing your organizati...
Democast
Data Staging and Data Exfiltration are common activities used in today’s ransomware playbooks. Data Staging is a combination of locating the data the attackers want to exfiltrate and then bringing all the parts together into a single repository. Data Exfiltration involves disguising the activ...
Cybercast
To establish an effective and proactive cloud security program, you need a plan to operationalize across your environment, while taking advantage of all the efficiencies and methodologies that make your security team’s job more manageable. But to truly inspire company-wide confidence in your approa...
Cybercast
The change in workforce dynamics caused by the pandemic and inability to stop attack campaigns requires drastic improvements to how Security Operations Centers (SOCs) function. Many user organizations must contend with a lack of quality of data, superior analytics and confidence in automation — lea...
Cybercast
We live in a world where the question is no longer whether your company will experience a data breach, but when. Hardly a day goes by that you don’t hear about a major data breach or a new cyberattack that’s making headlines—and the costs associated with these security events continue to mount. One...
Cybercast
APIs are the great connectors. API communications now make up more than 80% of Internet traffic and Gartner predicts that they will become the most frequent attack vector this year. Yet APIs are often overlooked in web application security programs. It’s not surprising that attackers are taking adv...
Cybercast
90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Based on research conducted by VMware̵...
Cybercast
In 2021, Gartner identified Cloud Native Application Protection Platforms (CNAPPs) as a new category that combines CSPM, CWPP, KSPM, and CIEM in one platform. CNAPPs have full coverage and visibility into cloud estates and can detect risks across the technological stack, including cloud configurati...
Cybercast
Third-party relationships have expanded exponentially as companies seek outsourced services and software to perform optimally and backfill talent amid the ongoing pandemic. That expansion has broadened attack surfaces as threat actors target weaker vendors with strong market penetration to quietly ...
Webcast
With security threats continuously mounting and the threat landscape evolving at record speeds, organizations continue to seek the guidance of Managed Security Service Providers (MSSPs). Why do these firms leverage MSSPs and what are the benefits of these investments? In this session, we’ll break d...
Democast
Within the MITRE ATT&CK framework, which attacks would you miss by not fully decrypting traffic?  Can fully decrypted traffic help detect attacks sooner? This webcast explores how to use decryption to more accurately detect malicious activity and defend against it. Speakers: Jamie Mo...
Cybercast
In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure as code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure are. Oft...
Cybercast
The true potential of the cloud is often hindered by security controls that weren’t purpose-built for dynamic, microservice architectures or the shared security and compliance responsibility common to cloud providers. Zero Trust security helps organizations harden their defenses and empower their e...
Democast
Microsoft Active Directory (AD) is a target-rich environment for malicious actors. Attackers hone in on it because it’s widely used and remains backward compatible with many versions of Microsoft Windows and Server environments. This webcast explores the specific techniques they use (DoublePu...
Webcast
You’ve been hearing it every January for the last decade: The coming year will see a continued escalation of ransomware attacks. But these past 12 months have been different. Ransomware gangs took their attacks to a dangerous new level, targeting ubiquitous software used by business, gover...
Cybercast
Today’s approach to defense in depth for application security are siloed, lack context, and results have fallen short. But a layered approach is the key to building a world-class AppSec program that spans the entire Software Development Lifecycle (SDLC). So, how does our approach need to chan...
Cybercast
Security has long been seen as the “department of no”, known for phrases like, “You can’t do that”, and “You can’t use that application.” But what if we told you that this mindset could change in an instant? That and security could be the business ...
Democast
With 1Password Business, your team can securely store and share passwords, infrastructure secrets, and other sensitive information – helping protect your organization’s most vulnerable data. Join us for an upcoming 1Password Business Demo to learn the platform’s many features, how to use it both ef...
Cybercast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. Those are among the findings from a survey CyberRisk Alliance conducted among InfraGard’s 77,000-plus membe...
Cybercast
Salesforce provides business-critical services for organizations interfacing with a vast matrix of suppliers, vendors, partners and customers. Unfortunately, the more connected the organization, the more appealing it is cyber criminals looking to gain access to these companies’ data and networks, a...
Cybercast
Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your ris...
Cybercast
With the rapidly accelerating move to cloud computing and the use of SaaS applications, organizations are struggling with legacy technologies like VPN, CASB, and “Legacy” MFA solutions that are either not secure enough, not easy enough for end users or both. What is emerging is modern, fundamentall...
Cybercast
You’ve developed an app, applied in-app protection, pen-tested it, then published it. But the need for mobile app security doesn’t stop once it’s released into the wild. This webinar will explore the role real-time threat monitoring plays in the constantly evolving app security landscape and how it...
Webcast
Unmanaged endpoints like IoT devices represent a significant and growing risk surface. Network Detection and Response (NDR) solutions monitor network traffic to generate rich security evidence that enables asset inventory, vulnerability assessment and threat monitoring. In this presentation, expert...
Webcast
The goal of SecOps teams is to monitor, detect, investigate, and respond to suspicious activity and events. Often, this leaves these teams in a reactive state, with minimal opportunity to reduce false-positives and innovate. One key aspect of innovative, mature SecOps programs? Their ability to gat...
Webcast
When it comes to detecting the next cyber breach, would your organization pass the test? SE Labs recently conducted the industry’s first network detection and response (NDR) test against NSX NDR using a range of advanced persistent threats designed to compromise systems and penetrate target network...
Webcast
Securing who has access to what, when and under the right conditions is foundational to any mature network security strategy. Learn how to augment and replace failing legacy security controls with Zero Trust Network Access (ZTNA), a proven and effective solution that minimizes risk AND simplifies o...
Webcast
The noise about eXtended Detection and Response (XDR) focuses too much on the market and vendors and not enough on problems security teams must solve. This webcast panel discussion among industry experts will focus on three of the most pressing cybersecurity challenges, why they are hard to solve, ...
Webcast
The pandemic illustrated the need for security operations that can function from anywhere. But a lot of orgs don’t have the resources to build this capability in-house and are turning to managed detection and response (MDR) providers for help. One of these providers is Expel — positioned as a...
Webcast
As more sensitive workloads and data continue to migrate to the cloud, cyber criminals and malicious actors are refocusing and sharpening their efforts to locate and attack them. Bad actors have discovered that they too can leverage the power of the cloud by compromising cloud applications and asse...
Webcast
With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.  Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challen...
Webcast
As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services and software, there’s one certainty we can rely on (thanks to the second law of thermodynamics): things will only get more complex. But there’s good news.  What we previously thought o...
Webcast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. That, according to a survey of InfraGard’s 77,000-plus membership, which includes organizations in the defense...
Webcast
Security teams know the key to catching and stopping attacks early is to understand how their adversaries think. But many are behind the curve, according to a recent survey (conducted by CyberRisk Alliance and sponsored by PlexTrac) among 315 security influencers and decision makers in the U.S. and...
Webcast
APIs sit at the heart of modern application development, connecting vital data and services. Hackers understand this reality and are increasingly targeting APIs. Existing security tooling cannot detect or stop today’s sophisticated API attacks.  In this webinar, you’ll learn steps you can...
Webcast
Today, the web browser is likely everyone’s most-used application. But with users online more than ever and constantly executing unknown, untrusted code, the browser also represents one of an organization’s largest attack surfaces.  Browser isolation solutions execute all browser code in th...
Webcast
In May, June, and July 2021, MIT Technology Review Insights, in association with Palo Alto Networks, surveyed senior executives with technology decision-making responsibilities across Asia-Pacific, Europe, the Middle East, Africa, and North America. The research seeks to understand what organizatio...
Webcast
When it comes to security, deciding where to dedicate resources is vital. It’s critical to know what security issues are most likely to crop up within your organization and their potential impacts. The challenge is that the most active threats change over time as the prevalence of different attacks...
Webcast
A new survey of over 1,000 security leaders shows organizations are making strides to improve their security posture but are missing the foundational capabilities needed to realize them. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational ineffici...
Webcast
With the proliferation of cloud, IoT, SaaS and agile everything, today’s IT environments are incredibly dynamic — and under constant attack. Traditional solutions weren’t built for these modern attack surfaces, missing critical exposures and overlooking attack-chain steppingstones, while inundating...
Webcast
Given the spate of software supply chain attacks, organizations need to do more to understand and correct development and build process vulnerabilities. The recent SolarWinds and Kaseya attacks have helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact...
Webcast
While it had always been business-critical, email became even more crucial as the COVID pandemic forced organization to adopt new business procedures rapidly. This is evident in Area 1 Security’s new study, “It Started Out with a Phish,” which analyzes over 31 million threats across multiple organi...