Cybersecurity Webcast Calendar

March
20
2:00 PM ET
Cybercast
Zero trust concepts are often muddied by misconceptions and industry jargon that can stump even the most senior security practitioners. This webinar will untangle the intricate facets of zero trust to help organizations advance and optimize their programs. Talking points include: The biggest misconceptions around zero trust and how to gain a c...
More info
March
Cybercast
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Attend this webinar to learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives. Regist...
More info
Cybercast
Managing the scope and complexity of third-party relationships can be a highly manual, time-consuming task for many security teams, and even after this effort effectively mitigating supply chain vulnerabilities remains one of the greatest threats to an organization’s security. In this panel discussion, security leaders share current approaches, ch...
More info
April
Cybercast
Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefor...
More info
Cybercast
As traditional security paradigms falter in the face of sophisticated cyber threats, zero trust emerges as a beacon of resilience. Join our expert panel for an in-depth exploration of the evolving landscape of zero trust, where strict identity verification is paramount, and the concept of assumed trust is fundamentally challenged. Gain valuable in...
More info
Cybercast
Identity and Access Management (IAM) solutions are no longer just ways to provide easy workforce access to applications, but critical tools in security and zero trust network access, creating the first line of defense against malicious actors and insider threats. In this panel discussion, experts from CyberRisk Alliance and CyberArk will shar...
More info
May
Live Event -
Connect with the brightest minds in the Identity Industry. Experience unparalleled education, collaboration, and insight into the future of Identity. Join us in Las Vegas at the end of May for a unique event experience and participate alongside experts and peers in information-rich sessions on the latest technologies, best practices, ...
More info
Cybercast
Join us as we unravel the intricacies and innovations shaping the future of network security. In an era of unprecedented connectivity, emerging technologies, and evolving cyber threats, the landscape of network security is undergoing transformative changes. Our experts will explore the key trends, challenges, and strategies that will define the fu...
More info
Cybercast
AI presents both opportunities and challenges for security professionals and development teams. Snyk’s Edgar Kussberg will discuss the pitfalls AI can bring to secure development and will highlight key stats from Snyk’s recently released 2023 State of AI report to show how security teams can boost productivity while managing risk.Don’t...
More info
Cybercast
A Third-Party Risk Management Implementation Guide and ToolkitThird parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk...
More info
Cybercast
High-profile breaches continue to highlight the multiple risks to organizations from their supply chain. With increasingly interconnected third-party networks leading to even greater risk exposure, it is not surprising that supply chain security is a top priority for both regulators and organizations. It is undoubtedly time to evolve our approach ...
More info
Cybercast
The technology world in 2030 promises a landscape radically transformed by unprecedented advancements. As the cloud engulfs everything, organizations will grapple with ephemeral technology, a surge in regulations, and an unrelenting need for speed that most organizations aren’t ready for. This webinar explores the future of compliance and risk in ...
More info
Cybercast
Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI tools to help their company as well as define the acceptable risks and proper usage.  This panel discussi...
More info
Webcast
Join us for a brilliant webinar titled “Where Industry Ideas Come to Life,” led by Andrew Hindle, the Conference Chair for Identiverse. This engaging panel discussion will feature a lineup of seasoned industry experts, including Allan Foster, David Brossard (CTO at Axiomatics), and Gerry Gebel (Strata Identity), who will delve deep int...
More info
Cybercast
The cybercrime economy is thriving, driven by financially motivated bad actors who have established lucrative “dark” businesses in the light of day. Bad actors prioritize efficiency to maximize their illicit earnings, using bots for everything from buying up coveted concert tickets to draining bank accounts to even more sinister endeavors to human...
More info
Cybercast
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk and vendor due diligence! This webcast with Bill Brenner and Enterprise Security Weekly host Adrian Sanabria will walk through: Improving the vendor...
More info
Cybercast
Balancing tight security budgets with growing threats is challenging for resource-limited IT teams. Taking the right approach, even organizations with 50 – 2,000 employees can build resilient and effective cybersecurity. Learn proven methods for strengthening security from industry experts. Moderated by Bill Brenner of CyberRisk Allian...
More info
Cybercast
Security teams need more from their tools – full stop. Cyware’s Threat Intelligence Platform (TIP) goes beyond the traditional offerings, leveraging advanced threat intelligence automation, high-volume IOC ingestion, simplified tool integrations, and endless intel operationalization capabilities for a proactive cyber defense. This demo will div...
More info
Cybercast
Companies, universities, and government agencies are eager to employ AI technologies like ChatGPT and AI Assistants, like Microsoft Copilot, to improve productivity and analytical capabilities.  However, AI introduces risks to the organization like data compromise and biased or false outputs. More than ever, CISO leadership is needed to manag...
More info
Cybercast
New year. New risks. New priorities. Your personal resolutions may be defined, but your organization’s risk resolutions might be a bit more ambiguous. Do you start from scratch? Or continue to focus on unresolved issues from 2023? With continued budget cuts, growing third-party relationships, and disruptive technology (hint. hint. AI), secur...
More info
Cybercast
HTTPS is the gold standard for encrypting and protecting data on the web—yet almost 86% of cyberthreats hide in encrypted traffic, too. It’s a double-edged sword: even as encryption protects sensitive data, it’s a key means for threat actors to bypass defenses. With the bulk of malware, ransomware, and phishing attacks hidden in TLS/SSL, how can e...
More info
Cybercast
The embrace of SaaS and operating in multi-cloud environments creates an expansive and dynamic attack surface, making it difficult for security teams to maintain visibility into and understand risk levels. And with the protection of sensitive data now a shared responsibility between security teams and providers, CISOs have additional consideration...
More info
Cybercast
In this webcast, we dissect the lessons derived from ransomware attacks involving MOVEit, Doubledrive, and the MGM/Caesars breach—to empower organizations in fortifying their cybersecurity defenses. The session will commence with an in-depth analysis of the MOVEit ransomware attack, unraveling the tactics employed by threat actors to exploit vu...
More info
Cybercast
With the potential of cost savings, reduced operational complexities, and speed to market, many organizations are migrating from on-premises and third-party data centers to Cloud computing environments.  However, accompanying these “cloud first” strategies are many challenges that include protecting confidential data and operating new securit...
More info
Cybercast
With the complexity of modern applications and their reliance on third-party components, protecting our software supply chains is paramount. But without a holistic way to connect and contextualize risks within CI/CD pipelines and source control managers, siloed software supply chain security (SSCS) solutions can end up creating more noise than App...
More info
Cybercast
The frequency of data breaches and leaks in 2023 has surpassed cyber incidents from the past five years, highlighting the necessity for strong cybersecurity frameworks. In his discussion, Bart Falzarano, Head of Information Security at Bitwarden, will highlight the critical role of Zero Trust architecture in enhancing Identity Access Management (I...
More info
Cybercast
In today’s digital enterprises, identity-centered security is critical to reduce vulnerable attack surfaces, but implementation or rearchitecting efforts can be costly, burdensome to security teams, and create friction for users. In this panel discussion, CISOs share their IAM implementation and maturation best practices and lessons learned alo...
More info
Cybercast
A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their...
More info
Cybercast
The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation...
More info
Cybercast
In an era dominated by cloud computing, the landscape of network security is undergoing a paradigm shift, presenting both unprecedented challenges and opportunities. Join us for an insightful webcast as we delve into the dynamic realm of network security in the age of cloud computing. We’ll explore the multifaceted aspects of securing networks in ...
More info
Cybercast
In application security, recognizing threats is just the beginning. Real success requires choosing the right tools, adopting effective methodologies, and integrating security practices into development gates across the software development lifecycle — from “shift left” early-stage strategies to “shift right” monitoring post...
More info
Cybercast
Threat actors never stop working and employing new tools to hold your data hostage and take your business down. Attack vectors are often multifaceted and evasive. And the risk of reinjecting vulnerabilities, compromised accounts, and other attack artifacts back into your environment is a pervasive threat. Compared to previous data exfiltration att...
More info
Cybercast
The increased complexity of malicious actors’ techniques demand CISOs stay one step ahead of the threat landscape while still preparing for potential worst-case scenarios. Join this panel discussion to learn the steps CISOs can take to minimize the impact of a ransomware attack. The discussion explores: The latest adversarial trends a...
More info
Cybercast
Applications and software supply chains are constantly changing. So is the threat landscape. Vulnerabilities, misconfigurations, exposed secrets, design flaws, sensitive data exposure, etc., will always be inevitable. That’s why application security remains such a vibrant market and why application security teams have a host of tools (SAST, SCA...
More info
Cybercast
AppSec has long been considered a subset of IT security, but today’s threats make securing applications an imperative for the entire business. But how do you make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped one client on its journey to eff...
More info
Cybercast
Just because a business is mid-sized doesn’t mean the security risks it encounters are any smaller than those experienced by large enterprises. All organizations, regardless of size, face the same challenges around identity growth and management. A growth that places a greater burden on smaller organizations with limited resources that need to rem...
More info
Cybercast
The Reckoning is here for Traditional MFA, as it’s not enough for cyber insurance compliance. Did you know that the most popular methods of MFA (like OTP and push to email / text) are easily hacked and are grounds for higher premiums and non-renewals? Everyone knows that MFA provides better protection against hackers than just SSO and 2...
More info
Cybercast
A company’s data is its lifeblood and must be protected at all costs. But the larger the data pile, the harder it is to manage. Attackers know this and are on a nonstop hunt for holes in your tech stack to exploit. To have a fighting chance, organizations need to approach security as a team sport.In this SC webcast, host Bill Brenner sits down wit...
More info
Cybercast
The U.S. Securities and Exchange Commission’s highly-anticipated new cybersecurity rules are finally in force, and deadlines are approaching quickly. Organizations, both public and private, will now have to take quick action to either establish or transform their cybersecurity programs to come into compliance with these new regulations and prevent...
More info
Cybercast
The volume of identities in use by the average organization has skyrocketed over the past several years, and non-employee identities are no exception. A recent study conducted by McKinsey found that 36% of the U.S. workforce is now made up of contract, freelance, and temporary workers—up from 27% in 2016. In addition to contract workers, today’s b...
More info
Cybercast
Getting work done has gotten easier: instead of having to deal with on-premises applications, VPNs, and VDI, employees and contractors can now do most of their work using only a browser, whether they are working onsite, 100% remotely or in a hybrid environment.  But with the browser effectively becoming the workplace super app, enterpris...
More info
Cybercast
When Fortune 500 companies suffer a cyberattack resulting in a data breach, they go down hard. “For organizations to recover is like rightsizing the Titanic,” says Nick Essner, head of cyber solutions at CYGNVS. Essner has seen the damage up close, time and again, as an incident response leader for 15 years at companies like Accenture and Mandiant...
More info
Cybercast
Managing access for hundreds or even thousands of identities in disparate systems with manual processes is difficult, inefficient and – worst of all – risky. Traditional certification campaigns are flawed and time-consuming because certifiers lack the insights and automation needed to make accurate, forward-looking decisions. Companies need t...
More info
Democast
It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. Fortunately, these two goals don’t have to contradict each other – and one way to balance these two needs is to approach security from a dev point of view. This live demo wi...
More info
Cybercast
Open source code provides developers with the shortcuts they need to innovate and iterate faster. But due to a host of open source vulnerabilities, some shortcuts are safer than others. Metaphorically speaking, are your organization’s developers taking a well-lit, mapped-out shortcut, or straying down a mysterious, risky, and forebo...
More info
Cybercast
Cyber risk and business risk are increasingly one and the same, and it’s about time that business-minded executives understood that reality when managing their budgets and agendas. With cybercriminal activity showing no signs of slowing down, companies must understand that a commitment to mitigating cyber risk represents an investment in the busin...
More info
Cybercast
We’re hosting an eye-opening webinar aimed to help you take your digital security to the next level — all from the vantage point of security analysts dealing with threat intelligence, threat hunting, research, detection engineering and incident response.   In this session, Real-world Insights from a Sophos Threat Analyst, Sophos will dive ...
More info
Cybercast
As bad actors look to blur the lines between real and fake, cybersecurity experts need to stay one step ahead of tech-savvy fraudsters. A simple, yet robust set of fraud prevention practices is often the best approach for stopping fraudsters at the gate.In this impactful Q&A webcast, you will see through the lens of two expert solution enginee...
More info
Cybercast
Though red teaming is sometimes perceived as pen testing with the gloves off, in reality, the goal of these engagements isn’t to prove how much damage these skilled testers can do. Modern red teams must set out to provide learning opportunities for organizations and their blue teams, running attack simulations to help teach them how to better prot...
More info
Cybercast
For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, cloud infrastructure, and developer tools, is increasingly essential. But more often, tracking dependencies to fixing vulnerabilities can still be siloed because common tools and processes to create un...
More info
Cybercast
The threat landscape is in continuous motion. It’s constantly shifting and reshaping itself, and it’s up to security professionals to establish that they’re charting the changes, lest they find themselves falling behind in the never-ending race with cyber adversaries. In this webcast, PwC’s Global Threat Intelligence te...
More info
Cybercast
Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative.  Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data...
More info
Cybercast
Even cybersecurity pros struggle to address the unique challenges of Kubernetes and container security. It can be disorienting to take a career full of knowledge in more traditional platforms and apply it to the leading edge of declarative infrastructure and microservices. This webcast is designed to help security teams get over the initial cultur...
More info
Cybercast
Cyber threats are costing businesses more than you even realize. In a recent survey of 3,000 security and IT leaders, 55% of respondents said that dealing with cyberthreats has negatively impacted their IT team’s work on other projects, while 64% said that efforts to combat the latest threats were taking away valuable time and resources from mo...
More info
Cybercast
Getting AppSec Right: Traceability and Security from Code to Cloud    Organizations want to deliver secure applications quickly, but rapidly changing and increasingly complex development environments make it difficult to find, prioritize and fix application vulnerabilities. Further, when AppSec teams discover security issues, they lack e...
More info
Cybercast
The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations clamor for tools to uncover and stop cyber intrusions more quickly. They understand that when a bad actor penetrates their organization, every second counts. Many have learned this lesson the hard w...
More info
Cybercast
In the face of rising cybersecurity threats, cyber readiness continues to be an urgent matter for every organization. But how do you achieve it?  Cyber readiness ultimately involves answering three different questions, each related to a different aspect of cybersecurity. These questions are:  (Network understanding) What is the state...
More info
Cybercast
Developing applications and web experiences that meet the needs of the modern user is a robust challenge for any organization. Join Fastly’s Travis Sanders, Principal Global Technology Solution Architect, in his discussion of the value of one unified platform for application and website innovation. During this webinar, Travis and Brock will highli...
More info
Cybercast
As adoption of software-as-a-service (SaaS) applications skyrockets, cybercriminals understand that the cloud has become a go-to vector for them to illegally access and compromise your data. Through phishing scams, exploits and abuse of misconfigurations, adversaries can steal, modify, encrypt or wipe your valuable SaaS-based assets – resulting...
More info
Cybercast
Join this webcast to learn about the findings from the 2023 State of Passwordless Security report and how you can use it to improve your organization’s security posture. CRA VP of Content Strategy Bill Brenner, Bojan Simic, HYPR’s Co-founder, CEO and CTO and  Andrew Shikiar, Executive Director & CMO, FIDO Alliance discuss key tak...
More info
Cybercast
The ultimate goal of User Access Reviews is to reduce security risk by ensuring that all access within an organization is appropriate and limited to legitimate current use cases. But, as Snowflake grows in terms of employees and systems, performing these reviews quarterly can become time-consuming, cumbersome, and error-prone in the absence of aut...
More info
Cybercast
There’s a lot of advice out there for how to secure the hardware, firmware and software that encompasses your company’s digital supply chain. But not all of it is immediately feasible for everyone, especially for organizations that are limited in resources or lacking security maturity.  Fortunately, this webcast will make sense of this c...
More info
Cybercast
Cybersecurity is a pressing issue for public-sector organizations in the US, as they face the challenge of sorting through a vast amount of cyber threat intelligence while operating with limited resources and a shortage of skilled infosec professionals. The consequences of a successful attack can be devastating, highlighting the importance of prio...
More info