Cybersecurity Webcast Calendar

July
31
2:00 PM ET
Cybercast
Siloed identity tools and legacy complexity are the enemies of a modern identity program. There is a growing interest in tool convergence – specifically IGA and PAM convergence. The promise of simplicity, efficiency, improved security, and enhanced governance is appealing and can help protect identities from deepfakes and other AI-based threats. B...
More info
August
Cybercast
Vulnerability management remains an uphill challenge for security teams. In this month of CISO Stories, we look at the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics include: Managing vulnerabilities on premises, in the cloud, and in third-party environments Identification, classification, prioritization, and remediation best practices Standards and charters Organizational structures Scanning tools. Supporting tools to be shared include a CISO’s Guide to Effective Vulnerabilities; and a Vulnerability Management Maturity Checklist. Practitioners will also connect the dots on how effective vulnerability management can be used to continuously improve identity, application, cloud and network security, anti-ransomware efforts, zero trust, email security, threat intelligence, AI and third-party risk management.
More info
Cybercast
Join us for a crucial webcast addressing the pivotal cloud security priorities that will define the second half of 2024. As organizations continue to embrace cloud technologies, the landscape of cloud security evolves at an unprecedented pace. Our expert panel will delve into the strategic imperatives crucial for securing cloud environments in the coming months. Explore topics ranging from the latest advancements in cloud security technologies to compliance considerations and proactive risk management strategies. Whether you’re migrating to the cloud or optimizing existing cloud infrastructure, this webcast will provide actionable insights to fortify your organization against evolving cyber threats.
More info
Cybercast
Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats. The incident response challenge is further complicated as enterprises rapidly deploy cloud and container-based technologies and embrace a multi-cloud strategy. A n...
More info
Cybercast
Ransomware attacks continue to evolve, presenting ever-increasing threats to organizations worldwide. Join us for an in-depth hot topics webcast where industry experts will delve into the latest ransomware trends and provide actionable guidance to navigate the challenges anticipated in the latter half of 2024 and early 2025. This comprehensive ses...
More info
September
Cybercast
This month of CISO Stories will look at the findings of a cross-sector task force of CISOs and staff who shared details of their incident management best practices, including incident response plans, playbooks, metrics, and business continuity plans. The Incident Management Best Practices Guide presents a framework and components for the incide...
More info
Cybercast
As the digital landscape continues to evolve, identity management remains a critical component of cybersecurity strategy. Join us for a timely webcast where leading experts will provide essential guidance on navigating identity challenges and opportunities anticipated in late 2024 and early 2025. This session will explore the latest trends in iden...
More info
Cybercast
As cloud adoption accelerates, securing cloud environments remains a top priority for organizations. Join us for an insightful hot topics webcast where industry experts will provide a comprehensive forecast of cloud security trends and offer strategic guidance for late 2024 and early 2025. This session will cover the latest threats, best practices...
More info
Cybercast
A robust GRC program fosters the ability to manage key risks and protect sensitive data, aligning security initiatives with organizational objectives; and ultimately allows the CISO to establish trust and confidence with key stakeholders. However, the constantly evolving regulatory landscape is resource intensive to manage and requires striking a ...
More info
Cybercast
The next generation of cybersecurity solutions is built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics and more, and it’s delivered where security teams already work. Security leaders at leading enterprises are building their security program with Snowflake. When security applications are plugged into the security data lake in Snowflake, the apps are able to leverage data and insights to make better correlations. In this webinar, we will discuss: How to leverage Snowflake as a security data lake and its ecosystem of cyber apps Efficient strategies for building detection and vulnerability management security programs with Snowflake cyber apps How customers like Xactly leverage Snowflake’s growing ecosystem of apps to derive value in less than 6 months How Xactly thinks about their cyber mesh architecture for building scalable security program
More info
Cybercast
Key objectives of a governance, risk, and compliance program (GRC) are to ensure that the cybersecurity program has appropriate oversight, identifies and addresses cyber risks, and complies with all applicable laws and regulations. GRC functions shape cybersecurity program components and its principal functions to reduce risk and meet all complian...
More info
Cybercast
As organizations navigate the dynamic landscape of governance, risk, and compliance (GRC), join our webcast to explore the critical priorities that will shape the second half of 2024. In an environment marked by evolving regulations, heightened cyber threats, and a rapidly changing business landscape, staying ahead of GRC challenges is paramount. ...
More info
Cybercast
Determining the most relevant cybersecurity metrics has long been discussed, but as high-profile attacks and regulatory scrutiny increases, effectively monitoring the progress and continued risk in a security program is paramount. In this panel, CISOs share their challenges and experiences implementing and expanding a metrics program and offer ins...
More info
Cybercast
Most conversations around Identity Resilience focus on the prevention of attacks. But as statistics increasingly show that a major breach is a matter of “when”, not “if”, CISOs are realizing that their Identity Resilience strategy is missing a critical piece: response. In this conversation, we’ll explore Identity Resilience from the lens of B...
More info
Cybercast
In the ever-evolving landscape of cyber threats, organizations are sitting on a goldmine of untapped potential within their existing security infrastructure. Our expert panel will guide you through innovative strategies to leverage your current tools for enhanced threat intelligence capabilities. Discover practical insights on optimizing SIEMs, le...
More info
Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their organization’s defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will de...
More info
Cybercast
CISOs strive to develop and use security metrics as an objective way to: (1) portray the state of their security programs; and (2) effect positive change to security controls, like patching within SLAs and improving phishing email awareness. However, they are challenged by data collection difficulties, limitations of reporting tools, and uncertain...
More info
Cybercast
Amid concerns about data privacy and its ties to the Chinese government, President Biden recently signed a law banning TikTok nationwide unless it is sold, leaving security practitioners with a multitude of questions around the future of mobile app security. This SC Panelcast will explore the ongoing concerns around TikTok, how the potential ban m...
More info
Cybercast
The rapid expansion of digital capabilities has moved sensitive data into various ecosystems, creating additional risk and compliance concerns for organizations. In this panel discussion, security leaders share their approach to striking the right balance of protecting data while enabling information sharing and innovation.   The discussio...
More info
Cybercast
In today’s rapidly evolving threat landscape, enterprises face a daunting challenge: phishing attacks empowered by artificial intelligence (AI) and readily available phishing toolkits. Join this webinar to learn about the latest phishing trends, tactics, and predictions revealed in the Zscaler ThreatLabz 2024 Phishing Report. Experts from Th...
More info
Cybercast
In this webcast, we unravel the insights and implications behind the latest global AI security guidelines, distilling complex recommendations into four key takeaways that every cybersecurity professional should know. As nations grapple with the rapid adoption of artificial intelligence, regulatory bodies worldwide have collaboratively devised comp...
More info
Cybercast
AI is fundamentally changing how software is written. Developers are increasingly relying on code generated by leveraging generative AI tools and application security experts are scrambling to understand and mitigate security risks. To counteract this emerging threat, the developer community must take proactive measures and foster a culture of con...
More info
Cybercast
By operating Records & Information Management (RIM) functions, data security and lifecycle management practices have been employed by organizations even before computing became the norm.  However, these practices are continually stretched to keep pace with new technologies, like AI, which can pose threats to data confidentiality and integ...
More info
Cybercast
It’s not rocket science, it’s network security. And yet for many organizations, the road to securing employees and information often results in trade-offs to performance, agility, scalable services, and user experience. While first-generation SASE solutions promised companies a way out of this complexity, those early deployments failed to resolve ...
More info
Cybercast
The unique characteristics of OT systems – legacy equipment, long lifecycles, and the convergence with IT networks – complicates deploying traditional security approaches. And these inherent weaknesses in OT environments create a low-hanging and potentially lucrative target for threat actors, making it critical that security teams take steps to en...
More info
Cybercast
Identity and Access Management (IAM) solutions are no longer just ways to provide easy workforce access to applications, but critical tools in security and zero trust network access, creating the first line of defense against malicious actors and insider threats. In this panel discussion, experts from CyberRisk Alliance and CyberArk will shar...
More info
Cybercast
Cybersecurity tools, especially those experienced by end users, are often seen as blockers – built to create friction. We have been trained to believe that there must be a trade–off between security and user experience. If we are too strict users go around or just complain! Too lenient and we leave gaps for attackers to exploit. What if we b...
More info
Cybercast
As traditional security paradigms falter in the face of sophisticated cyber threats, zero trust emerges as a beacon of resilience. Join our expert panel for an in-depth exploration of the evolving landscape of zero trust, where strict identity verification is paramount, and the concept of assumed trust is fundamentally challenged. Gain valuable in...
More info
Cybercast
In the digital age, identity serves as both a shield and a sword in the realm of cybersecurity. Statistics reveal that 74% of breaches stem from the human element, highlighting the paradoxical nature of identity in the cyber era. This panel explores the interplay between social engineering and technological sophistication to detect these Identity ...
More info
Cybercast
Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefor...
More info
Cybercast
Managing the scope and complexity of third-party relationships can be a highly manual, time-consuming task for many security teams, and even after this effort effectively mitigating supply chain vulnerabilities remains one of the greatest threats to an organization’s security. In this panel discussion, security leaders share current approaches, ch...
More info
Cybercast
Zero trust concepts are often muddied by misconceptions and industry jargon that can stump even the most senior security practitioners. This webinar will untangle the intricate facets of zero trust to help organizations advance and optimize their programs. Talking points include: The biggest misconceptions around zero trust and how to gain a c...
More info
Cybercast
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Attend this webinar to learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives. Regist...
More info
Cybercast
Join us as we unravel the intricacies and innovations shaping the future of network security. In an era of unprecedented connectivity, emerging technologies, and evolving cyber threats, the landscape of network security is undergoing transformative changes. Our experts will explore the key trends, challenges, and strategies that will define the fu...
More info
Cybercast
AI presents both opportunities and challenges for security professionals and development teams. Snyk’s Edgar Kussberg will discuss the pitfalls AI can bring to secure development and will highlight key stats from Snyk’s recently released 2023 State of AI report to show how security teams can boost productivity while managing risk.Don’t...
More info
Cybercast
A Third-Party Risk Management Implementation Guide and ToolkitThird parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk...
More info
Cybercast
High-profile breaches continue to highlight the multiple risks to organizations from their supply chain. With increasingly interconnected third-party networks leading to even greater risk exposure, it is not surprising that supply chain security is a top priority for both regulators and organizations. It is undoubtedly time to evolve our approach ...
More info
Cybercast
The technology world in 2030 promises a landscape radically transformed by unprecedented advancements. As the cloud engulfs everything, organizations will grapple with ephemeral technology, a surge in regulations, and an unrelenting need for speed that most organizations aren’t ready for. This webinar explores the future of compliance and risk in ...
More info
Cybercast
Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI tools to help their company as well as define the acceptable risks and proper usage.  This panel discussi...
More info
Webcast
Join us for a brilliant webinar titled “Where Industry Ideas Come to Life,” led by Andrew Hindle, the Conference Chair for Identiverse. This engaging panel discussion will feature a lineup of seasoned industry experts, including Allan Foster, David Brossard (CTO at Axiomatics), and Gerry Gebel (Strata Identity), who will delve deep int...
More info
Cybercast
The cybercrime economy is thriving, driven by financially motivated bad actors who have established lucrative “dark” businesses in the light of day. Bad actors prioritize efficiency to maximize their illicit earnings, using bots for everything from buying up coveted concert tickets to draining bank accounts to even more sinister endeavors to human...
More info
Cybercast
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk and vendor due diligence! This webcast with Bill Brenner and Enterprise Security Weekly host Adrian Sanabria will walk through: Improving the vendor...
More info
Cybercast
Balancing tight security budgets with growing threats is challenging for resource-limited IT teams. Taking the right approach, even organizations with 50 – 2,000 employees can build resilient and effective cybersecurity. Learn proven methods for strengthening security from industry experts. Moderated by Bill Brenner of CyberRisk Allian...
More info
Cybercast
Security teams need more from their tools – full stop. Cyware’s Threat Intelligence Platform (TIP) goes beyond the traditional offerings, leveraging advanced threat intelligence automation, high-volume IOC ingestion, simplified tool integrations, and endless intel operationalization capabilities for a proactive cyber defense. This demo will div...
More info
Cybercast
Companies, universities, and government agencies are eager to employ AI technologies like ChatGPT and AI Assistants, like Microsoft Copilot, to improve productivity and analytical capabilities.  However, AI introduces risks to the organization like data compromise and biased or false outputs. More than ever, CISO leadership is needed to manag...
More info
Cybercast
New year. New risks. New priorities. Your personal resolutions may be defined, but your organization’s risk resolutions might be a bit more ambiguous. Do you start from scratch? Or continue to focus on unresolved issues from 2023? With continued budget cuts, growing third-party relationships, and disruptive technology (hint. hint. AI), secur...
More info
Cybercast
HTTPS is the gold standard for encrypting and protecting data on the web—yet almost 86% of cyberthreats hide in encrypted traffic, too. It’s a double-edged sword: even as encryption protects sensitive data, it’s a key means for threat actors to bypass defenses. With the bulk of malware, ransomware, and phishing attacks hidden in TLS/SSL, how can e...
More info
Cybercast
The embrace of SaaS and operating in multi-cloud environments creates an expansive and dynamic attack surface, making it difficult for security teams to maintain visibility into and understand risk levels. And with the protection of sensitive data now a shared responsibility between security teams and providers, CISOs have additional consideration...
More info
Cybercast
In this webcast, we dissect the lessons derived from ransomware attacks involving MOVEit, Doubledrive, and the MGM/Caesars breach—to empower organizations in fortifying their cybersecurity defenses. The session will commence with an in-depth analysis of the MOVEit ransomware attack, unraveling the tactics employed by threat actors to exploit vu...
More info
Cybercast
With the potential of cost savings, reduced operational complexities, and speed to market, many organizations are migrating from on-premises and third-party data centers to Cloud computing environments.  However, accompanying these “cloud first” strategies are many challenges that include protecting confidential data and operating new securit...
More info
Cybercast
With the complexity of modern applications and their reliance on third-party components, protecting our software supply chains is paramount. But without a holistic way to connect and contextualize risks within CI/CD pipelines and source control managers, siloed software supply chain security (SSCS) solutions can end up creating more noise than App...
More info
Cybercast
The frequency of data breaches and leaks in 2023 has surpassed cyber incidents from the past five years, highlighting the necessity for strong cybersecurity frameworks. In his discussion, Bart Falzarano, Head of Information Security at Bitwarden, will highlight the critical role of Zero Trust architecture in enhancing Identity Access Management (I...
More info
Cybercast
In today’s digital enterprises, identity-centered security is critical to reduce vulnerable attack surfaces, but implementation or rearchitecting efforts can be costly, burdensome to security teams, and create friction for users. In this panel discussion, CISOs share their IAM implementation and maturation best practices and lessons learned alo...
More info
Cybercast
A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their...
More info
Cybercast
The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation...
More info
Cybercast
In an era dominated by cloud computing, the landscape of network security is undergoing a paradigm shift, presenting both unprecedented challenges and opportunities. Join us for an insightful webcast as we delve into the dynamic realm of network security in the age of cloud computing. We’ll explore the multifaceted aspects of securing networks in ...
More info
Cybercast
In application security, recognizing threats is just the beginning. Real success requires choosing the right tools, adopting effective methodologies, and integrating security practices into development gates across the software development lifecycle — from “shift left” early-stage strategies to “shift right” monitoring post...
More info
Cybercast
Threat actors never stop working and employing new tools to hold your data hostage and take your business down. Attack vectors are often multifaceted and evasive. And the risk of reinjecting vulnerabilities, compromised accounts, and other attack artifacts back into your environment is a pervasive threat. Compared to previous data exfiltration att...
More info
Cybercast
The increased complexity of malicious actors’ techniques demand CISOs stay one step ahead of the threat landscape while still preparing for potential worst-case scenarios. Join this panel discussion to learn the steps CISOs can take to minimize the impact of a ransomware attack. The discussion explores: The latest adversarial trends a...
More info
Cybercast
Applications and software supply chains are constantly changing. So is the threat landscape. Vulnerabilities, misconfigurations, exposed secrets, design flaws, sensitive data exposure, etc., will always be inevitable. That’s why application security remains such a vibrant market and why application security teams have a host of tools (SAST, SCA...
More info
Cybercast
AppSec has long been considered a subset of IT security, but today’s threats make securing applications an imperative for the entire business. But how do you make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped one client on its journey to eff...
More info
Cybercast
Just because a business is mid-sized doesn’t mean the security risks it encounters are any smaller than those experienced by large enterprises. All organizations, regardless of size, face the same challenges around identity growth and management. A growth that places a greater burden on smaller organizations with limited resources that need to rem...
More info
Cybercast
The Reckoning is here for Traditional MFA, as it’s not enough for cyber insurance compliance. Did you know that the most popular methods of MFA (like OTP and push to email / text) are easily hacked and are grounds for higher premiums and non-renewals? Everyone knows that MFA provides better protection against hackers than just SSO and 2...
More info
Cybercast
A company’s data is its lifeblood and must be protected at all costs. But the larger the data pile, the harder it is to manage. Attackers know this and are on a nonstop hunt for holes in your tech stack to exploit. To have a fighting chance, organizations need to approach security as a team sport.In this SC webcast, host Bill Brenner sits down wit...
More info
Cybercast
The U.S. Securities and Exchange Commission’s highly-anticipated new cybersecurity rules are finally in force, and deadlines are approaching quickly. Organizations, both public and private, will now have to take quick action to either establish or transform their cybersecurity programs to come into compliance with these new regulations and prevent...
More info
Cybercast
The volume of identities in use by the average organization has skyrocketed over the past several years, and non-employee identities are no exception. A recent study conducted by McKinsey found that 36% of the U.S. workforce is now made up of contract, freelance, and temporary workers—up from 27% in 2016. In addition to contract workers, today’s b...
More info
Cybercast
Getting work done has gotten easier: instead of having to deal with on-premises applications, VPNs, and VDI, employees and contractors can now do most of their work using only a browser, whether they are working onsite, 100% remotely or in a hybrid environment.  But with the browser effectively becoming the workplace super app, enterpris...
More info
Cybercast
When Fortune 500 companies suffer a cyberattack resulting in a data breach, they go down hard. “For organizations to recover is like rightsizing the Titanic,” says Nick Essner, head of cyber solutions at CYGNVS. Essner has seen the damage up close, time and again, as an incident response leader for 15 years at companies like Accenture and Mandiant...
More info
Cybercast
Managing access for hundreds or even thousands of identities in disparate systems with manual processes is difficult, inefficient and – worst of all – risky. Traditional certification campaigns are flawed and time-consuming because certifiers lack the insights and automation needed to make accurate, forward-looking decisions. Companies need t...
More info
Democast
It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. Fortunately, these two goals don’t have to contradict each other – and one way to balance these two needs is to approach security from a dev point of view. This live demo wi...
More info
Cybercast
Open source code provides developers with the shortcuts they need to innovate and iterate faster. But due to a host of open source vulnerabilities, some shortcuts are safer than others. Metaphorically speaking, are your organization’s developers taking a well-lit, mapped-out shortcut, or straying down a mysterious, risky, and forebo...
More info
Cybercast
Cyber risk and business risk are increasingly one and the same, and it’s about time that business-minded executives understood that reality when managing their budgets and agendas. With cybercriminal activity showing no signs of slowing down, companies must understand that a commitment to mitigating cyber risk represents an investment in the busin...
More info
Cybercast
We’re hosting an eye-opening webinar aimed to help you take your digital security to the next level — all from the vantage point of security analysts dealing with threat intelligence, threat hunting, research, detection engineering and incident response.   In this session, Real-world Insights from a Sophos Threat Analyst, Sophos will dive ...
More info