Upcoming webcasts

  • Show:
  • Show All
Thu June 21, 2:00 PM ET

Vendor Webcast

Solving The Cybersecurity Skills Shortage in Law Firms

What are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

x

Solving The Cybersecurity Skills Shortage in Law Firms

The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture.  What are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure? 

In this Arctic Wolf webinar, we dive into:

  • Why cybersecurity is top of mind in the legal community
  • The IT and Cybersecurity skills shortage and its impact on security
  • How SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
More Info

Sponsored by: Arctic Wolf

Tue June 26, 2:00 PM ET

20/20 Webcast

Teach a Man to Fish, not to Phish

In this 20/20 webinar, we take a deeper look into how enterprises are addressing the rise of Phishing emails.

x

Teach a Man to Fish, not to Phish

Phishing has become the new four-letter word – and I don’t mean spending a relaxing summer’s day in a boat on a quiet lake or a lazy stream. No inbox can escape the deluge of email threats. While today’s technology has done an adequate job with known threats, catching the tip of the spear attacks still alludes most IT organizations.  To add to the headache, chasing and investigating these highly sophisticated attacks has become a full-time job. In today’s 20/20 webinar, we take a deeper look into how enterprises are addressing the rise of Phishing emails. Can security awareness can help solve this problem? What else should IT be considering?
More Info

Sponsored by: Edgewave

Wed June 27, 2:00 PM ET

20/20 Webcast

Building a Threat Intelligence Environment

This 20/20 webcast will address how you go about building a threat intelligence environment.

x

Building a Threat Intelligence Environment

Threat intelligence is no longer just confined to the data centers of the Global 1000 companies; today mid-size companies are starting to build out their threat intelligence capabilities as well. But threat intel is more than just collecting data feeds and supercharging your SIEM. Today's 20/20 webcast will address how you go about building a threat intelligence environment. It will include advice on where to find the intelligence, as well as the differences between quality and quantity of intelligence necessary to make your endeavor successful.
More Info

Sponsored by: Anomali

Thu June 28, 2:00 PM ET

Vendor Webcast

Exposed and At Risk! Why Your Approach to Web App Security is Insufficient

Proven web application security approaches and modern WAF technologies to address the rapidly evolving security needs of hybrid cloud environments.

x

Exposed and At Risk! Why Your Approach to Web App Security is Insufficient

While web and legacy apps, APIs, and microservices are now common and essential components of any digital business, their ever-increasing complexity also creates vast attack surfaces and prime targets for malicious threats. In fact, according to a recent survey conducted by Ponemon, 80% of organizations stated their web apps were compromised ‘sometimes’ or ‘frequently.’ This figure is shockingly high, considering 73% of those organizations were utilizing a web application firewall (WAF). So where is the disconnect?

Join Michael Suby, Vice President of Research at Stratecast | Frost & Sullivan, and Bret Settle, CEO and Founder of Threat X, as they discuss the power of combining proven web application security approaches and modern WAF technologies to address the rapidly evolving security needs of hybrid cloud environments. 

You will learn:

  • Why both the drivers and types of web application attacks are rapidly evolving.
  • What threats you ARE missing with your current approach to web application security.
  • Why it's critically important that your WAF solution protects ALL your Web applications.
  • Why security technology and human expertise/intervention are powerful partners.


More Info

Sponsored by: Threat X

Thu June 28, 2:00 PM ET

Vendor Webcast

Tracing Threat Actors by Their Footprints and Web Assets

Learn how the threat intelligence space is transforming

x

Tracing Threat Actors by Their Footprints and Web Assets

Organizations are experiencing new and evolving cyberthreats that are increasing in both sophistication and frequency. In response to the new challenges, threat hunting is gaining momentum as a security practice that helps organizations take a more proactive stance on security. Many SOCs are going through a posture shift as they pivot from traditional reactive security stance to a hybrid approach that includes proactive hunting of threats that is oftentimes powered by a host of indicators and web assets.

 

Join DomainTools Data Systems Engineer, Mike Thompson to learn how the threat intelligence space is transforming and what techniques security professionals can apply to stay a step ahead of threat actors by mapping their infrastructure.
More Info

Sponsored by: DomainTools

On-Demand Webcasts

  • Show:
  • Show All

Vendor Webcast

Under Pressure: Prepping for a Post-Quantum World

Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing...

x

Under Pressure: Prepping for a Post-Quantum World

On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing, crypto-agility:
 
  • Demystifying quantum computing: cryptographic kryptonite
  • Challenges with digital certificate/device management at scale
  • Futureproof, quantum-safe digital identity solutions for today’s Enterprise & IoT

More Info

Sponsored by: CSS

Vendor Webcast

Still Falling Foul to Phishing?

Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better...

x

Still Falling Foul to Phishing?

It has been around for many years, but phishing is not a problem that’s going away any time soon. In fact, given that attackers have shifted from targeting systems to targeting people, phishing is a tool of growing importance for threat actors, and something that potential victims need to be aware of. Learn how organizations can prevent, detect and respond to all email threats, including phishing and social engineering and how you can use this framework to better protect your organization. 

Join us as we discuss: 

  • Effective security training to help prevent falling for an attack 
  • The right tools and methods for detecting phishing 
  • How to respond when to email threats
More Info

Sponsored by: Proofpoint

Vendor Webcast

How to Make Endpoint Security Easy

What if you could prevent attacks before they occur and spend less time managing multiple agents?

x

How to Make Endpoint Security Easy

Traditional anti-virus solutions can’t keep up with the pace of emerging threats. What if you could prevent attacks before they occur and spend less time managing multiple agents?

Join us for a live webinar with Ryan Manni, Security Operations Manager at Hologic, as we discuss their evaluation of cloud-based endpoint security and why they chose Cb Defense.  Hologic is an innovative medical technology company focused on improving women’s health.  Their security challenges included preventing non-malware attacks, gaining visibility into remote employees, and managing complex infrastructure with a small IT staff. 

  • Learn why Hologic replaced their traditional AV solution with Cb Defense
  • Discover how Cb Defense can help you prevent emerging attacks and simplify your security stack
  • Get practical advice on replacing traditional AV with a cloud-based security platform
More Info

Sponsored by: Carbon Black

Vendor Webcast

How to Accelerate GDPR Compliance with Druva inSync

Join us for a live, technical webinar and learn what the GDPR requires and how to accelerate compliance within your business.

x

How to Accelerate GDPR Compliance with Druva inSync

The deadline for General Data Protection Regulation (GDPR) compliance has passed. As organizations scramble to meet the strict requirements put in place by the European Union, many of us still don’t understand what it is - or how to achieve compliance.

Join us for a live, technical webinar and learn what the GDPR requires and how to accelerate compliance within your business. Our special guest, Michael Osterman, President of Osterman Research and Druva’s Sarah Beaudoin, Product Marketing Manager will review the results of the new report, “The GDPR Deadline has passed. What should you do?”

You’ll learn:
• Essential requirements of GDPR
• How prepared your organization is for GDPR compliance
• Critical implications to backup, storage, recovery and archiving of data
• How Druva can help accelerate your GDPR compliance readiness

Register Now



 

More Info

Sponsored by: Druva

Vendor Webcast

What Most Computer Security Defenses Are Doing Wrong and How to Fix It

You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

x

What Most Computer Security Defenses Are Doing Wrong and How to Fix It

Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.  But it doesn’t have to be that way!

Join Roger A. Grimes, a 30-year computer security consultant and author of 10 books, for this on-demand webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way. Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

Roger will teach you:
  • What most companies are doing wrong, why, and how to fix it
  • An action plan to improve the effectiveness of your computer security defenses
  • How to create your “human firewall”

More Info

Sponsored by: KnowBe4

Editorial Webcast

Morphing Threat Intelligence

Consider threat intelligence not only from its traditional place in the overall security function, but ways to use it to expand your security functions and capabilities...

x

Morphing Threat Intelligence

Generally when we think of threat intelligence, we think of using threat feeds to defend against malware and other pre-breach defenses. This is often included in the vulnerability management component of network security, but threat intelligence is much more than that. Today we’ll explore how using threat intelligence for incident response or perhaps more transactional functions such as security operations or security leadership can help expand a company’s security footprint and consider threat intelligence not only from its traditional place in the overall security function, but ways to use it to expand your security functions and capabilities.
More Info

Sponsored by: Recorded Future

20/20 Webcast

Vulnerability Management: The Final Frontier

This 20/20 webcast addresses how to recognize and manage these vulnerabilities, and ultimately how to reduce your risk.

x

Vulnerability Management: The Final Frontier

We’ve said it before and we’ll say it again: It’s all about managing risk, which means managing vulnerabilities. The decisions companies make about what security products they employ generally comes back to risk. It could be financial risk in terms of sales lost, money stolen or potential fines and lawsuits due to vulnerabilities in processing personal information, credit card data, or simply identity and access management. It could be reputational risk from network vulnerabilities – certainly a very visible and tangible issue faced by companies such as Target, Home Depot and social media sites following massive breaches.  It could be legal risk – the vulnerabilities here are too numerous to list. Today’s 20/20 webcast addresses how to recognize and manage these vulnerabilities, and ultimately how to reduce your risk.
More Info

Sponsored by: Rapid7

Vendor Webcast

GDPR: The New World of Data Privacy is here. Now What?

Join us for a recap of GDPR’s history, a brief overview of some of the regulation's key elements, and a quick checklist of basic steps you can take in preparation...

x

GDPR: The New World of Data Privacy is here. Now What?

After over two years of preparation, the European Union's General Data Protection Regulation has finally arrived. The General Data Protection Regulation (GDPR) is all about protecting your data and a significant amount of sensitive personal data resides in databases. Have you assessed all your data sources to locate personal data? Do you have critical controls to protect that data? Do you have a coordinated strategy to ensure overall compliance? Join us for a recap of GDPR’s history, a brief overview of some of the regulation's key elements, and a quick checklist of basic steps you can take in preparation for GDPR. We will also discuss some of the best practices we’ve seen Oracle Database customers take in order to accelerate GDPR compliance.
More Info

Sponsored by: Oracle

20/20 Webcast

Cloudy With a Chance of SIEMs

This 20/20 webcast will address the challenges CISOs face from the ever-improving attackers.

x

Cloudy With a Chance of SIEMs

Being predictable is the death knell for network security. Defenses are becoming more sophisticated so attackers using standard attacks are a sure way of getting caught. That means that attackers are forced to become more sophisticated and cleverer with their attacks. It also means the corporate defense, and mainly the tools that interpret the attacks, need to be better. Today’s 20/20 webcast will address the challenges CISOs face from the ever-improving attackers.
More Info

Sponsored by: Rapid7

Vendor Webcast

Mobile Phishing 2018: A look at mobile threats now facing every enterprise

Mobile phishing is the biggest unsolved cybersecurity problem facing enterprises today

x

Mobile Phishing 2018: A look at mobile threats now facing every enterprise

Mobile phishing is the biggest unsolved cybersecurity problem facing enterprises today. The rate at which users are receiving and tapping Phishing URLs on their mobile device has grown by an average of 85% Year-over-Year since 2011. Lookout-exclusive research into mobile phishing has uncovered a number of malicious actors globally, including the state-sponsored group behind Dark Caracal that focused on mobile phishing to compromise over 600 phones in over 21 countries. Even Pegasus, the one-tap remote jailbreak exploit sold by cyber-arms dealer NSO group required the victim to tap a phishing message in an SMS. FrozenCell, xRAT, ViperRAT, SocialPath, and Xsser/mRAT are all mobile threats that start with phishing.

More Info

Sponsored by: Lookout

Vendor Webcast

Capturing the Flag with Active Deception Defenses

Join security experts to learn what happens when active deception defenses are put into a CTF exercise against human attackers and malware.

x

Capturing the Flag with Active Deception Defenses

Capture the flag (CTF) exercises and events continue to increase in popularity providing essential training and skills development for defenders on blue teams and attackers on red teams.  Jeopardy style or attack-defense CTF cyber exercises enable experienced participants and novices to work side by side on teams developing communication, time management and problem solving skills in a safe environment with ground rules and prizes for winners.  Defending blue teams often dread the embarrassment of being attacked and compromised until modern deception defenses arrived.  Deception defenses mimic a real environment with decoys and breadcrumbs creating an unknown mine field for attackers to detect their activity and movements giving defending blue teams a new advantage.   

Join security experts to learn what happens when active deception defenses are put into a CTF exercise against human attackers and malware? 

 

  • Learn the types of capture the flag exercises and benefits for participants
  • Assessment of blue team and read team CTF exercises for your organization
  • Comparing honeypot research versus post-breach deception detection
  • Understand the most popular breadcrumbs and decoys for deception and why
  • Lessons learned from active deception defenses within a CTF exercise

 

More Info

Sponsored by: Fidelis

Vendor Webcast

Securing the Virtual Data Center

Establish a Least Privilege Environment around applications to lock them down and dramatically shrink the attack surface

x

Securing the Virtual Data Center

As applications in the data center become more distributed and more dynamic, they have become increasingly difficult to secure. Traditional security solutions are not flexible enough to keep up with applications as they change over time, leading to breakdowns in security.

Additionally, traditional endpoint security solutions are focused on preventing the infiltration step of the kill chain, but threats inside the data center are well past this step -- busy propagating or extracting information from the environment.

Join Carbon Black and VMware to learn how to:
• Establish a Least Privilege Environment around applications to lock them down and dramatically shrink the attack surface
• Understand the value of behavioral threat detection and how, by leveraging application context and scope to perform advanced analysis, you can catch threats that evade least privilege
• Learn how to benefit from an automated, orchestrated response that remediates threats with precision and minimizes business impact while eradicating the threat



 

More Info

Sponsored by: Carbon Black

Vendor Webcast

Cybersecurity Heroes Aren’t Born … They’re Made

Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community...

x

Cybersecurity Heroes Aren’t Born … They’re Made

Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.

During this session, we will share results from the Wombat Security 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness.

Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization.

Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community.

 

More Info

Sponsored by: Wombat Security

20/20 Webcast

Cutting off the Phish Heads

Phishing is more than just an inconvenient, low-level attack; it potentially could have a devastating impact on a company.

x

Cutting off the Phish Heads

Phishing is more than just an inconvenient, low-level attack; it potentially could have a devastating impact on a company. Understanding why and how it happens, as well as what must be done to defend against it in advance, is the topic of today’s 20/20 webcast.
More Info

Sponsored by: Cofense

20/20 Webcast

Breaking Bad – or Good Habits

In Part 2 of our series on social engineering, we’ll take a deeper dive on some approaches attackers take, why they work and what we can do to defend against them...

x

Breaking Bad – or Good Habits

We recently looked at how to identify a social engineering attack and how they work in My Friend My Enemy. In Part 2 of our series on social engineering, we’ll take a deeper dive on some approaches attackers take, why they work and what we can do to defend against them. As much as human nature tells you that it’s polite to hold open a door or to answer a door if someone knocks, sometimes that’s just the wrong thing to do. Here’s why.
More Info

Sponsored by: KnowBe4

Vendor Webcast

Getting Started With Threat Intelligence

Maintaining situational awareness can be a full time job, and you need to know how the latest high profile attack affects your organization… like 15 minutes ago...

x

Getting Started With Threat Intelligence

Security professionals need to quickly identify real threats to their organization, even if they don’t have the budget to build out a dedicated threat intelligence team. Maintaining situational awareness can be a full time job, and you need to know how the latest high profile attack affects your organization… like 15 minutes ago. 

The good news is that small security teams can use threat intelligence to increase detection while minimizing the number of false positives being sent to defensive devices.
 
Join us for this interactive webcast where you’ll learn how to:
• Select and optimize the threat data you’d like to ingest in your SIEM or EDR device
• Minimize the time it takes to determine whether or not something is a threat
• Keep up with new threat actors, attack patterns, and CVEs

More Info

Sponsored by: ThreatConnect

Vendor Webcast

Reduce Cyber Risk with Tenable and ServiceNow

Learn how a small security team from Carfax went from using email for vulnerability management to automating the process down to a click of a button.

x

Reduce Cyber Risk with Tenable and ServiceNow

Vulnerabilities and the risks they pose to security continue to be big news. Keeping up with an overwhelming number of vulnerabilities in continually expanding IT environments is challenging, but it’s one of the best ways to reduce your cyber risk. To successfully manage vulnerabilities, you need to detect, prioritize, and remediate efficiently. Combining Tenable Security Center® and ServiceNow® Security Operations allows you to automate vulnerability remediation so you can work faster and keep your business safe.

Join us for this hour-long webinar on Tuesday, May 1, at 8am PDT/11am EDT, and learn how a small security team from Carfax went from using email for vulnerability management to automating the process down to a click of a button. Hear from Carfax Security Analyst Jered Bare about how they integrated Tenable and ServiceNow, along with benefits and lessons learned in the process. 

Nick Keuning, Solution Architect at Tenable and David Barkovic, Director, Product Management at ServiceNow will also demonstrate how best to use these products together to get efficient vulnerability response. Don’t miss this informative webinar!
More Info

Sponsored by: ServiceNow

Vendor Webcast

Improving Incident Response Outcomes

Join us for a one hour webcast featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices...

x

Improving Incident Response Outcomes

How to Defend Faster and Reduce Risk More Effectively in the Face of a Cyberattack

All too often companies are learning the hard way -- during an incident -- how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats. Webcast takeaways will include:
• Threat and attack trends identified by responders in 2017
• Lessons learned by organizations in a wide variety of incident response (IR) scenarios
• Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
• Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team

In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by a panel of speakers from the Secureworks Counter Threat Unit and Incident Response practice.

This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.



 

More Info

Sponsored by: SecureWorks

Vendor Webcast

Enabling Data-Driven Cybersecurity Decisions with Continuous Security Validation

Register for this informative webcast to learn more about how your organization can work toward eliminating the fear, uncertainty, and doubt associated with cybersecurity...

x

Enabling Data-Driven Cybersecurity Decisions with Continuous Security Validation

Despite extensive effort and investment, achieving an effective cybersecurity strategy remains an elusive pursuit. Enterprises spent an estimated US$90 billion on cybersecurity products in 2017, and yet a recent NSS Labs survey of CISOs in North America reveals that 52% of enterprises see no “value-add” from their currently deployed security products. Security teams are under more pressure than ever to justify budget allocation for security controls, but most of the time, measuring security effectiveness is a guessing game.

Anil Nandigam, Senior Director of Product Marketing with NSS Labs, will conduct a live demonstration of the Continuous Security Validation Platform. This cloud-based customizable platform provides real-time empirical data regarding the effectiveness of enterprise security controls and also reveals the operating systems and applications most often targeted by today’s active threats. Anil will also discuss how an international bank and a top-five management consulting firm are using this platform to make data-driven cybersecurity decisions. 

Register for this informative webcast to learn more about how your organization can work toward eliminating the fear, uncertainty, and doubt associated with cybersecurity.



 

More Info

Sponsored by: NSS Labs

Vendor Webcast

Putting Threat Intelligence to Work Part II

We’ll take a deeper dive into making threat intelligence work for you, including addressing issues of infrastructure, training, nation state attacks, and proactive...

x

Putting Threat Intelligence to Work Part II

Last week we talked about the changing threat landscape -- understanding the change, anticipating the next evolution of change, and having actionable defenses in place. This week we’ll take a deeper dive into making threat intelligence work for you, including addressing issues of infrastructure, training, nation state attacks, and proactive threat management.
More Info

Sponsored by: Arbor Networks

20/20 Webcast

The Evolving World of Threat Intelligence

This 20/20 looks at what we can do today to better prepare for the attacks of tomorrow.

x

The Evolving World of Threat Intelligence

It seems that every year we see advancements in threat intelligence and analytics, only to see the bad guys are a step ahead of us. No matter how much money we throw at new technology, new data feeds and new training, attackers are still making their way into our networks, stealing our data, and making the data security teams and the C-suite look like the junior varsity team playing against the pros. This 20/20 looks at what we can do today to better prepare for the attacks of tomorrow. 

More Info

Sponsored by: Crowdstrike

Vendor Webcast

Making Awareness Stick: Secrets to a Successful Security Awareness Training Program

Join Erich Kron, Security Awareness Advocate at KnowBe4, as he shares results-focused strategies and practical insight on how to build a world-class program.

x

Making Awareness Stick: Secrets to a Successful Security Awareness Training Program

With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training. 

Join Erich Kron, Security Awareness Advocate at KnowBe4, for this webinar "Making Awareness Stick: Secrets to a Successful Security Awareness Training Program" as he shares results-focused strategies and practical insight on how to build a world-class program.

Key topics covered in this webinar:
  • Why awareness and training matters
  • Key data points to help make the case for awareness in your organization
  • Five secrets to making awareness work in 2018
  • How to create your "Human Firewall"
  • Make this the year that you refuse to settle for mediocrity. Are you ready to go all-in?
More Info

Sponsored by: KnowBe4

Editorial Webcast

Bigger Risks, Bigger Challenges

This webcast looks at the challenges today's security team faces, the training necessary today to meet those challenges, and the pressures on the infosec team that...

x

Bigger Risks, Bigger Challenges

New research shows that the job of cybersecurity staffers is getting far more difficult than it was five years ago. Gone are the days when updating A/V software and applying patches were considered "security." Today's security pros need to be concerned with threat intelligence, threat hunting, far more malicious zero-days and state-sponsored attacks. Today's webcast looks at the challenges today's security team faces, the training necessary today to meet those challenges, and the pressures on the infosec team that might not have existed just a few years ago.  
More Info

Sponsored by: Recorded Future

Vendor Webcast

Get GDPR-Ready - Because Data Protection Is About to Get Personal

Join us as Adam Nelson, Associate Partner and Global Privacy Leader for IBM Security and Cindy E. Compert, CIPT/M, CTO Data Security & Privacy for IBM Security...

x

Get GDPR-Ready - Because Data Protection Is About to Get Personal

On May 25, 2018, the General Data Protection Regulation (GDPR) will take effect, impacting every organization conducting business with individuals in the EU- consumers, employees, and business contacts alike.  On that date, organizations will encounter new, uniform data protection regulations relating to the information of EU subjects—or potentially face hefty fines and other penalties. Yet many business, privacy and security leaders are not ready for it. To help address our clients' concerns, IBM Security has developed a five-phased framework approach to GDPR readiness.

Join us as Adam Nelson, Associate Partner and Global Privacy Leader for IBM Security and Cindy E. Compert, CIPT/M, CTO Data Security & Privacy for IBM Security as they take you through this critical security framework.

This webinar will provide an overview of the IBM Security GDPR framework, and will also cover:
• An introduction to the EU GDPR, including its purpose, key aspects and provisions of the regulation, and new or enhanced requirements
• Steps organizations are taking on their path to GDPR readiness and what can be done to prepare 
• A deep-dive into the five phases of GDPR readiness, with a focus on security and privacy requirements and activities for you to consider in each phase
• Solutions that can help organizations address these requirements, no matter where they are in their readiness journey

More Info

Sponsored by: IBM

Vendor Webcast

5 Keys to Understanding Vulnerability Disclosure

5 keys to understanding vulnerability disclosure

x

5 Keys to Understanding Vulnerability Disclosure

2017 was undoubtedly another year of escalation in size, scope and scale of cyber attacks. It goes without saying that this past year everyone was impacted by at least one of these breaches. But it’s been a year of unprecedented change as well – change for the better. With policies and standards in place such as the NIST Cybersecurity Framework, it’s now incumbent on organizations to ensure they are setup to receive vulnerability data from external parties and is already becoming an adhered-to standard for major private organizations.
 
A vulnerability disclosure program (VDP) is the initial first step in helping protect your company from an attack or premature vulnerability release to the public.
 
Join our webinar as we discuss:
 
• 5 keys to understanding vulnerability disclosure
• The impact VDP is having on the industry
• Why implementing a VDP is no longer a nice-to-have, but a necessity
More Info

Sponsored by: Bugcrowd

Vendor Webcast

Examining the State of Security Operations and How to Automate Threat Detection and Response

How to automate alert triaging and prioritization

x

Examining the State of Security Operations and How to Automate Threat Detection and Response

Prevention is still important within the security approach, but with borderless enterprises and sophisticated attackers who have the motivation and financial means, they will find a way into your organization. And most Security Operations Centers (SOCs) are under siege. Security analysts oftentimes have more alerts than they can typically triage and investigate, giving attackers more time to evade detection and taking longer for SOCs to respond. The result is that once attackers break in, they often stay hidden inside for too long – moving laterally and stealing sensitive data.
 
Fidelis Cybersecurity commissioned 360Velocity to conduct an enterprise study on the State of the SOC, including current trends and practices of threat detection and response. Join this webinar to listen to security experts Dr. Chenxi Wang of 360Velocity and Tim Roddy, VP of Cybersecurity Product Strategy at Fidelis examine:
 
• How to automate alert triaging and prioritization
• The case for and how to integrate network sensors and endpoint enforcement
• How to standardize processes for threat detection and response
• Meaningful SOC metrics to use for understanding effectiveness/ineffectiveness
• Threat hunting – what it entails and how to confirm threats that resulted in an incident

More Info

Sponsored by: Fidelis

20/20 Webcast

Putting Threat Intelligence to Work

We will look at how this landscape is changing and what you need to do prepare for these changes. Next week we’ll take a look at specific actions you can take now...

x

Putting Threat Intelligence to Work

The threat landscape is changing on a daily basis. The challenges we faced just weeks ago change at the blink of an eye. Understanding the change, anticipating the next evolution of change, and having actionable defenses in place — a proactive defense and flexible as it were — is key to keeping on top of new attacks. In today’s 20/20 webcast, the first of two, we will look at how this landscape is changing and what you need to do prepare for these changes. Next week we’ll take a look at specific actions you can take now.
More Info

Sponsored by: Arbor Networks

Vendor Webcast

Drive Transformative Economic Results by Improving Security Response

Forrester Consulting interviewed current ServiceNow customers to quantify our solution’s benefits for a composite organization

x

Drive Transformative Economic Results by Improving Security Response

Forrester Consulting interviewed current ServiceNow customers to quantify our solution’s benefits for a composite organization[1], including: Increased efficiency of prioritizing and resolving security incidents, improved vulnerability management and response times, and better visibility into security posture. 

Attend our free webinar, featuring guest speaker Anish Shah of Forrester, to learn how the composite organization achieved these benefits while driving transformative economic results including: 

  • $5.6M total 3-year benefits
  • $355K Opex savings by eliminating legacy security tools
  • 230% ROI
More Info

Sponsored by: ServiceNow

Vendor Webcast

Stop Writing Rules.  Start Commanding Intent.

In this webinar, we’ll show you how to implement intent-based security.

x

Stop Writing Rules. Start Commanding Intent.

Traditional security models are all about the current state – but in the current state of cyber-security, by the time new rules are written, they’re obsolete. Resources have changed, topologies have shifted, traffic has evolved, and applications grew new arms and legs. 
  
Because networks and the approach to them have changed, we need new methods of security. 
 
Intent-based network security (IBNS) isn’t the sexiest thing to ever emerge from the IT tech stack, no, but it’s one of the most functional. It removes the need to write rules.  Instead, you infuse your intent to every resource, device, asset, workload, and human on the network. Enterprises can leverage their security intent, even if their rules and infrastructure dates to the ‘90s. 
 
In this webinar, we’ll show you how to implement intent-based security.  It just takes a method and you’ll see desired-state security take the lead.
 
Specific topics we’ll address include:
 
• Establishing your global declarative policy
• Translating security intent to any infrastructure (on-prem, cloud, virtual, and containers)
• Automating controls based on security intent and network adjustments
• Monitoring security with network self-awareness
• Dynamically remediating when networks drift away from your desired state

More Info

Sponsored by: FireMon

Vendor Webcast

GDPR Takes A Village: Practical Advice to Help You Achieve Compliance

Show customers your commitment by changing how your organization uses and protects information.

x

GDPR Takes A Village: Practical Advice to Help You Achieve Compliance

The GDPR compliance deadline signals a big shift for organizations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organization uses and protects information.

Every employee has an important role to play but many don’t even realize it.

You need each person who handles, has access to, or may inadvertently see personal data to learn the basics of data protection so they can take appropriate steps when they encounter data in their work.

Join guest Enza Iannopollo, Analyst at Forrester Research and Doug Snow, VP of Customer Success, TITUS on:

 

  • Why collaboration across the organization is essential
  • The role of data discovery and classification to mitigate risk
  • The importance and benefits of building a culture a security.

 



More Info

Sponsored by: TITUS

20/20 Webcast

The Relative Threat Within

This 20/20 webcast looks at some of the techniques you can use to identify and defend against insider attacks.

x

The Relative Threat Within

No one likes to admit it, but threats from trusted insiders is a serious issue. Sometimes the threat is due to benign actions of employees, but often the threat is as serious as anything you’d see in a nation-state or other criminal attack. Today's 20/20 webcast looks at some of the techniques you can use to identify and defend against insider attacks.
More Info

Sponsored by: HID Global

Vendor Webcast

Tackling the risks of open source security: 5 things every CISO needs to know

In this webinar, we will present 5 approaches and best practices that security teams should implement in order to enable their developers to harness the power of...

x

Tackling the risks of open source security: 5 things every CISO needs to know

Open Source has become the key building block for application development in today's market, where companies are under constant pressure to  accelerate time to market. The increasing adoption of open source components, however, has introduced new security challenges that most teams are not prepared to mitigate in their current posture.  In this webinar, we will present 5 approaches and best practices that security teams should implement in order to enable their developers to harness the power of open source without slowing them down or compromising on security.
More Info

Sponsored by: WhiteSource

Vendor Webcast

Your Organization Through the Eyes of an Attacker

In this webinar, we'll show you easy ways to stalk and attack your organization to improve security.

x

Your Organization Through the Eyes of an Attacker

Attackers follow a number of paths as they search for entry-points into your organization. In this webinar, we'll show you easy ways to stalk and attack your organization to improve security.

Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, in this practical session providing a high-level overview of the theory/practices used, showing you how to simulate those same tactics using both free and subscription-based aspects of KnowBe4's platform.

Key topics covered in this webinar:
  • Understanding the attacker's workflow
  • Selecting targets and entry points
  • Promoting a culture of security awareness
  • Creating your own 'Red Team' activities using KnowBe4 as part of penetration testing initiatives
More Info

Sponsored by: KnowBe4

Vendor Webcast

2018 State of the Phish™

In this webinar, we will review the key findings and insights from our 2018 State of the Phish™ Report

x

2018 State of the Phish™

Phishing continues to be one of the fastest growing and most malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced.

In this webinar, we will review the key findings and insights from our 2018 State of the Phish™ Report:

 

· Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period

· Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors

· Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats

More Info

Sponsored by: Wombat Security

Vendor Webcast

How to effectively combat email fraud

Join us and learn how attackers use email fraud to attack their victims and about the framework that can prevent these attacks for impacting your business.

x

How to effectively combat email fraud

 

While ransomware and other high profile, high volume attacks have made many headlines, email fraud has silently been attacking companies around the world. In 2017, over 80% of organizations experienced at least one email fraud attack. Email fraud attacks are low volume attacks that impersonate a person in authority to try and trick the victim into sending money or data out of the organization.

Join us and learn how attackers use email fraud to attack their victims and about the framework that can prevent these attacks for impacting your business.

More Info

Sponsored by: Proofpoint

20/20 Webcast

Who Chaperons the Chaperone

What happens when the people who are designated to ensure compliance and privacy are maintained are the same ones who are responsible for the resulting vulnerabilities...

x

Who Chaperons the Chaperone

Today’s risk and compliance regulations make it essential that companies build in policies and procedures to ensure that security and privacy is maintained throughout the supply chain. But what happens when the people who are designated to ensure compliance and privacy are maintained are the same ones who are responsible for the resulting vulnerabilities and potential breaches? This has become more common as the perimeter has given way to partner portals, shared data and multi-tenant cloud environments where the traditional moat and firewall no longer exist.
More Info

Sponsored by: eSentire

Vendor Webcast

PKI for the Future

Join speakers Tom Klein and Sami Van Vliet as they introduce the next generation in PKI and digital certificate management

x

PKI for the Future

What’s next for public key infrastructure (PKI)? Outdated and complicated PKI and digital certificate management processes are not only a security risk, but also introduce extreme inefficiencies and expenses.
With buzzes around blockchain and two factor authentication for secure identity, how does the age old PKI solution stack up when it comes to security, cost, scale and convenience?

Join speakers Tom Klein and Sami Van Vliet as they introduce the next generation in PKI and digital certificate management- a futureproof, all-inclusive digital certificate and PKI operations management solution designed to enable total control of your Enterprise PKI.

· Automation: Reduce outages, security gaps, cost and inefficiencies
· Scale: Enable rapid business growth and IoT readiness grounded by crypto agility
· Cost: Lower entry point plus no per certificate management fees

More Info

Sponsored by: CSS

Vendor Webcast

Important First Steps for Complying with the GDPR

ServiceNow and Wrangu provide, through live demos, 5 important ways we can help you prepare for the GDPR while significantly reducing the time needed to manage...

x

Important First Steps for Complying with the GDPR

Determining where to begin to comply with the GDPR can be daunting. ServiceNow and Wrangu demo 5 important ways we can help you prepare for the GDPR while significantly reducing the time needed to manage compliance.  We will wrap up with other ways ServiceNow can help ensure GDPR compliance now that you’ve begun your journey.
More Info

Sponsored by: ServiceNow

Vendor Webcast

Building an Identity-Aware Maturity Model for your Cloud Security

This ​webcast lays out what a CASB maturity model would look like and how this ties into the identity-enabled SOC.

x

Building an Identity-Aware Maturity Model for your Cloud Security

As organizations embrace the cloud for applications, platforms and infrastructure, security is of utmost importance, not only to avoid being a breach statistic, but also to ensure top line growth and maintain competitive advantage. A comprehensive identity enabled Security Operations Center (SOC) meets these needs better than an assembly of point solutions to address individual security needs. However, building such a SOC requires planning, execution and sustained commitment. A Cloud Access Security Broker (CASB) forms one of the most crucial building blocks to enable cloud visibility and control in the SOC. However, many organizations start their CASB journey for just obtaining visibility into SaaS applications and grapple with choices on where to go next. The true value that a CASB provides for the underlying security and intelligence of its cloud adoption journey is seldom realized.  This ​webcast lays out what a CASB maturity model would look like and how this ties into the identity-enabled SOC.
More Info

Sponsored by: Oracle

Vendor Webcast

Enterprise Digital Rights Management: Myth or Miracle?

In this one-hour webcast, you’ll learn how a new generation of solutions make EDRM significantly easier to deploy, manage, and adopt.

x

Enterprise Digital Rights Management: Myth or Miracle?

Traditional methods for protecting information such as file encryption are simply not enough in today’s collaborative and highly regulated environment. What is needed is to persistently protect and audit the use of data, wherever it travels, without impacting productivity.
 
Optimized security starts with a data-centric security framework that uses Enterprise Digital Rights Management (EDRM) to control the use of data even while it is being used. So… whether a hacker breaks in, an employee leaves with sensitive information on a personal device, or a contractor decides to share information with unknown recipients, the data remains protected and under your control.
 
In this one-hour webcast, you’ll learn how a new generation of solutions make EDRM significantly easier to deploy, manage, and adopt.  You’ll discover:
 
•        How EDRM can seamlessly complement your other data-centric security solutions
•        Tips for layering EDRM into your other enterprise systems to automate protection
•        Use cases and customer stories for manufacturing, financial services, and legal entities
•        How to ensure EDRM is readily adopted by internal and external collaborators
 
Join us for this webinar by registering today!

More Info

Sponsored by: Seclore

20/20 Webcast

Corralling the Shiny Object

This 20/20 looks at what you need to know in advance in order to do incident response effectively and efficiently.

x

Corralling the Shiny Object

Incident response is all about speed. How quickly can a potential breach be identified? How quickly can a compromised system be quarantined? How quickly can an investigation start? There are a lot of moving pieces in incident response, but knowing what to do when, who needs to do it, and having policies and procedures are just as important as finding the initial breach. Today’s 20/20 looks at what you need to know in advance in order to do incident response effectively and efficiently.
More Info

Sponsored by: Rapid7

Vendor Webcast

IT Hell.  Bullet-proof Strategies to Become an IT Hero

How to use compliance checking and network visibility to counter everyday malware threats

x

IT Hell. Bullet-proof Strategies to Become an IT Hero

Your boss and users expect that workers have continuous access to the information and applications they need.  But what happens when the unexpected occurs? Natural calamities like hurricanes, snowstorms or earthquakes or man-made disasters such as ransomware and network outages can make your life hell. How will you and your network cope? Learn how to bulletproof user access to time-critical information and mission-critical applications with Secure Access strategies that blend security compliance, dynamic scaling and geographic redundancy for both the cloud and data center.  Specifically, this webinar will show you how to: 

  • Get ready for the unexpected with a proactive checklist
  • How to use compliance checking and network visibility to counter everyday malware threats
  • Scale user access dynamically during emergencies
  • Shift data center resources seamlessly during crisis
  • Learn by example with a real-world case study

Get ready, and be the hero when the unexpected strikes.

More Info

Sponsored by: Pulse Secure

20/20 Webcast

The Ransomware Pay-off

Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, it’s not-so-obvious...

x

The Ransomware Pay-off

Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, it’s not-so-obvious impacts, and how you can prepare for the next attack in today’s 20/20 webinar.

More Info

Sponsored by: PhishMe

Editorial Webcast

Still Intruding After All These Years

This Analysis Brief survey looks at how IDS technology is evolving in the real world

x

Still Intruding After All These Years

Intrusion detection is hardly a bleeding edge technology, but there's a reason we still use it -- detecting an intrusion is the first step to stopping a serious data breach. This Analysis Brief survey looks at how IDS technology is evolving in the real world and how CISOs are improving on this technology that has been part of the layered network defenses since the 1980s.
More Info

Sponsored by: BluVector

Vendor Webcast

It’s Time to Move Endpoint Security to the Cloud

Traditional endpoint security products are holding organizations back. It’s time to move your antivirus to the cloud.

x

It’s Time to Move Endpoint Security to the Cloud

Traditional endpoint security products are holding organizations back. It’s time to move your antivirus to the cloud.

Please join our security experts at Carbon Black and Network Security Engineer, Christopher St. Amand at PeoplesBank for a live webinar as we discuss the benefits of cloud-based security platforms and how they apply to your specific needs.
  • Learn how cloud-based solutions make security easier and more effective.
  • Discover how cloud-solutions bring the advantages of big data analytics and real-time to endpoint security.
  • Get insight to the three types of cloud security platforms and how to choose the right one for your business.
  • Learn how to leverage a predictive cloud model to get ahead of emerging attacks, take action faster on security top priorities, and simplify your security stack.
More Info

Sponsored by: Carbon Black

20/20 Webcast

My friend, my enemy

This 20/20 looks at how companies normalize the conflicting requirements of meeting compliance requirements and setting risk levels appropriate for the organization...

x

My friend, my enemy

 

It’s always nice to find a kindred spirit — someone who knows what you know and likes what you like. The problem today is that kindred spirit whom you think is your friend might well be your worst enemy. One of the most effective tools attackers use to breach everything from high-security networks and physical installations to your most closely held secrets is social engineering. Today’s 20/20 webcast looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.

 

More Info

Sponsored by: KnowBe4

Vendor Webcast

Extinguish Pesky Vulnerabilities for Good: Spectre, Meltdown and More

Identifying and remediating security vulnerabilities and incidents isn’t always easy. On average, over 80% of organizations are concerned with their ability to...

x

Extinguish Pesky Vulnerabilities for Good: Spectre, Meltdown and More

Identifying and remediating security vulnerabilities and incidents isn’t always easy. On average, over 80% of organizations are concerned with their ability to address known security vulnerabilities or incidents timely or accurately. They struggle because they lack confidence in their endpoint data due to incomplete visibility and control. 64% of organizations believe that a successful attack on endpoints is likely to recur and succeed again. You think you remediated SMBv1 and EternalBlue. Several organizations have seen incidents pop up again, on top of needing to address the newest wave of vulnerabilities such as Spectre and Meltdown.


However, it's possible to break out of the re-compromise cycle for good. As the endpoint security landscape evolves, how can you ensure you are able to fully extinguish pesky vulnerabilities?

 

More Info

Sponsored by: Tanium

Vendor Webcast

Securing Software that Runs the Digital World

Digitization is everywhere – changing every interaction and transaction, and our software-driven digital economy is poorly equipped to withstand cyber-attacks.

x

Securing Software that Runs the Digital World

Digitization is everywhere – changing every interaction and transaction, and our software-driven digital economy is poorly equipped to withstand cyber-attacks.  Are business leaders simply unable to keep up with the pace of the digital transformation, or are they unaware of the security implications of their digital initiatives? How are technology leaders prioritizing security within their overall initiatives and where does the training and empowerment of development teams come into play in securing software?

More Info

Sponsored by: Veracode

Vendor Webcast

Bye Bye Backhauling: better branch office protection

Register today to see how you can say bye bye to backhauling and hello to better branch security.

x

Bye Bye Backhauling: better branch office protection

Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions.

With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control.

Register today to see how you can say bye bye to backhauling and hello to better branch security.
More Info

Sponsored by: Cisco

Vendor Webcast

Counter the Careless Click, Tools to Help You Train Your Users

A practical session with tips and free tools you can implement now to help you create your “human firewall”.

x

Counter the Careless Click, Tools to Help You Train Your Users

Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*

Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.

Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.

Erich will cover:
• Current threat landscape
• Top 5 tips for security awareness
• How to easily create your security awareness program
• Outlining how and where tools are helpful

* Based on recent research by the Ponemon Institute

More Info

Sponsored by: KnowBe4

Vendor Webcast

Boosting Efficacy and Efficiency with SaaS Security

Learn how to SaaS security can improve your efficiency and overall security posture

x

Boosting Efficacy and Efficiency with SaaS Security

Security teams face significant challenges including budget constraints and a lack of trained personnel. Meanwhile numerous point products and noisy security solutions cause security teams to waste time managing their technology and chasing false alarms.

To address these challenges, you need to find a way to make your security team more efficient, your strategy more cost-effective, and your technology more actionable.

Software-as-a-Service (SaaS) security can help you achieve these goals. In this session, you will learn how SaaS and Cisco Stealthwatch Cloud can:
• Simplify technology deployment and maintenance
• Provide flexible pricing options
• Make your security team more efficient
• Lower security “noise” and false alerts

Join Bryan Doerr, a Cisco Product Manager with years of experience in cloud-based security, to learn how to SaaS security can improve your efficiency and overall security posture.



 

More Info

Sponsored by: Cisco

Vendor Webcast

SOC-as-a-Service, MDR, MSSP or SIEM. What’s right for Small to Mid-Size Enterprises?

In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM

x

SOC-as-a-Service, MDR, MSSP or SIEM. What’s right for Small to Mid-Size Enterprises?

With small to mid-size enterprises (SMEs) being increasingly targeted by cyber security attacks, the demand for a solution that provides comprehensive visibility into cyber security threats has gone up. Amid these concerns, SMEs are also dealing with a shortage of cyber security skills in IT-staffs and the lack of budgets to detect and respond to advanced threats. So, what solutions are currently on the market and what are their pros and cons when it comes to managed detection and response? 

In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM, and discover which solution is the best fit for your organization.
 
After watching, you will learn why:

• Cloud-based security-as-a-service is gaining momentum with SMEs
• SIEM is a great technology for those who can manage it on their own
• MSSP is great for outsourced security management, but not an answer for better cybersecurity
• SOC-as-a-Service are the turnkey service that SMEs are looking for

To determine what’s the best fit for your organization’s security, register now.

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Is your security stack ready for 2018?

Is your security stack ready for 2018?

x

Is your security stack ready for 2018?

2017 brought forth an increase in breaches, attacks, and ransomware instances. Trends around mobility, the growing number of IoT devices, SaaS app usage and the amount of sensitive data stored in the cloud will continue to increase.

While increased mobility and flexibility in the workplace has led to reduced costs and booming productivity and independence, it comes at a price. Attackers are getting bolder and employees are no longer safely protected behind their firewall or secure web gateway.

Is your security stack ready for 2018?

Join us on December 7, 2017, 11am PT / 2pm ET to discuss the shift towards secure internet gateway and why a new approach to security is needed. Kevin Rollinson will explain why existing network security solutions need to adapt. We’ll look at the shifts in the market and the safe bets for protecting your data, users and apps in 2018.
More Info

Sponsored by: Cisco

Vendor Webcast

Building a Stronger Castle from the Inside Out

Identifying and Securing Business Critical and Regulated Information That Leaves Your Castle

x

Building a Stronger Castle from the Inside Out

Identifying and Securing Business Critical and Regulated Information That Leaves Your Castle

You’ve heard it over and over again how securing the network, applications and devices is just not enough. Focusing only on stopping break-ins to your network leaves your data vulnerable when an intruder finds a back door way in. But what happens when your data leaves the front gate to conduct business with contractors, suppliers, partners, etc.? 

In this one hour webcast, you’ll learn how to build a strong Data-Centric Security strategy by classifying sensitive information and automatically applying security controls to the data whether it stays inside or outside your castle. Join Seclore and Boldon James to learn how to: 
  • Apply visual and metadata classification labels to clearly identify sensitive data
  • Automatically add persistent protection to sensitive data based on policy rules
  • Control access and usage to sensitive data wherever it travels
  • Stay compliant with real time audits of file access and usage

Who should attend? Anyone who manages or is concerned with data security, privacy, compliance or risk management.

More Info

Sponsored by: Seclore

Vendor Webcast

Mobile Application Security and Analytics

Learn best practices for enterprise mobile application security

x

Mobile Application Security and Analytics

Securing high value, consumer facing mobile applications is quickly becoming a top priority for financial services, connected healthcare, and gaming companies, among many others. Large enterprises are finding out the hard way that unprotected mobile apps expose numerous vulnerabilities that can lead to lost revenue, brand damage, IP theft and potential loss of life.


Join Arxan Solution Architect Paul Dant and SC Media to learn best practices for enterprise mobile application security along with the risks most companies assume by not using mobile app security. We’ll cover:

Anatomy of a hack for high-value mobile apps
Key differences between application hardening and application wrapping
Definition of binary code protection and self-defending apps
The importance of usage and threat analytics insights
2018 predictions and trends for mobile app protection
More Info

Sponsored by: Arxan

Vendor Webcast

The Internet of Things: Changing the Future of PKI

We’ll explore how to secure your PKI, how to choose a deployment model, and why the IoT is the next game-changer for the future of PKI.

x

The Internet of Things: Changing the Future of PKI

We’ve teamed up with Certified Security Solutions (CSS) to share the latest and greatest regarding public key infrastructure (PKI) and the Internet of Things (IoT). We’ll explore how to secure your PKI, how to choose a deployment model, and why the IoT is the next game-changer for the future of PKI.

Join the webcast to learn about:

• Trends in PKI usage
• Challenges your enterprise may face as you support more PKI-enabled applications
• Adaptations of traditional PKI to the IoT
• How IoT solutions such as Thales nShield HSMs and the CSS VerdeTTO Internet of Things Identity Platform address trust and authentication for IoT devices and data

Enterprises just like yours are investing in strengthening the security posture of their PKI. Sign up for this webcast to learn how your enterprise can do the same.

More Info

Sponsored by: Thales e-Security

Vendor Webcast

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

What you can do to make your organization a harder target for cybercrime

x

Phishing and Social Engineering in 2018: Is the Worst Yet to Come?

Ransomware has tipped the 1 billion mark and damages are expected to be around 5 billion before the year is out. Use of ransomware has evolved throughout the year with a 600% rise in URL emails delivering malware in just Q3 2017. CEO fraud (aka BEC) has cost another 5 billion according to the FBI as of May 2017. What's next and how can you protect your organization?

Join Security Awareness Advocate at KnowBe4, Erich Kron, for this 60-minute webinar “Phishing and Social Engineering in 2018: Is the Worst Yet to Come?”.  Erich will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

Key topics covered in this webinar:
  • Understanding the current threat landscape
  • What scary new threats will be on the rise for 2018
  • Next innovations of ransomware, phishing and social engineering
  • What you can do to make your organization a harder target for cybercrime
  • How to create your “human firewall”
More Info

Sponsored by: KnowBe4

Vendor Webcast

Enhancing Threat Detection with Big Data and AI

Why cyber security analysis and threat detection are a challenge in the big data era

x

Enhancing Threat Detection with Big Data and AI

Enterprises today face a daily barrage of cyberattacks. Responding quickly to threats is crucial to avoiding a serious breach. To do this successfully, security teams need to monitor and analyze billions of data signals each day. 

Yet, existing security tools are struggling to keep up. Threats are going unnoticed and remediation timelines are being pushed out. Overcoming these challenges requires a new approach to threat detection rooted in data science.

Join this webinar to learn:
  • Why cyber security analysis and threat detection are a challenge in the big data era
  • How real-time, big data analytics and AI enhance threat detection and uncover anomalous behavior patterns
  • A live demo showcasing how Data Scientists can use the Databricks platform to improve an organization's security posture with highly scalable, real-time analytics and AI while reducing ingress and retention costs

More Info

Sponsored by: DataBricks

Vendor Webcast

The Path from DevOps to DevSecOps: It’s not as direct as it seems

Technology solutions needed for security to seamlessly integrate into DevOps – technologies that application development, operation, and security specialists don’t...

x

The Path from DevOps to DevSecOps: It’s not as direct as it seems

DevOps has not yet fully transitioned to DevSecOps - leaving the DevOps inherently insecure. What is preventing security from integrating into DevOps? This discussion will offer an answer. Specifically, it will define capabilities that application security should adopt, explain how existing technologies should change, forecast emerging technologies, and estimate the pace of application security transformation within this era of DevOps. 

Join Joseph Feiman, Chief Innovation Officer at Veracode, will discuss the technology solutions needed for security to seamlessly integrate into DevOps – technologies that application development, operation, and security specialists don’t have to learn, see, or run. He’ll share insights into these technologies, forecast the pace of their adoption, and evaluate benefits of adopting one technology versus another.  Attendees of this session will learn what will come to the market within the next few years, how to plan adoption, and what will or will not work when application security eventually transforms to enable DevSecOps.
This webinar is for CISOs and CIOs, security managers and security specialists, as well as development and operations managers and specialists.



 

More Info

Sponsored by: Veracode

Vendor Webcast

Addressing GDPR Compliance: Implementing a security framework

How to leverage Oracle experience and technologies to implement a security framework that can help address GDPR.

x

Addressing GDPR Compliance: Implementing a security framework

Addressing GDPR compliance requires a coordinated strategy that involves different organizational divisions such as legal, human resources, marketing, security, IT and others.  The regulation requires these and various other entities like customers, employees as well as communications and technology, to protect personal data.  However, with all these components and a due date that is just around the corner, how can organizations create and implement a coordinated strategy that addresses GDPR security compliance?  Join us to hear expert advice and insight from members of the Oracle leadership team on how to leverage Oracle experience and technologies to implement a security framework that can help address GDPR.
More Info

Sponsored by: Oracle

Vendor Webcast

What’s Your Attack Model: Choosing the right endpoint solution for your enterprise security program

Join the Endgame team to learn how your organization must focus on the broadest coverage and scope

x

What’s Your Attack Model: Choosing the right endpoint solution for your enterprise security program

 

Targeted cyber attacks have a profound effect on enterprises. To combat these attacks, security teams add protections reactively to stop new attacker techniques. Most endpoint security solutions focus on a single attack vector, such as malware execution, which isn’t enough. Organizations need defenses - against the full scope of techniques used by adversaries - to rapidly detect and remediate before damage and loss. This includes prioritizing the people, process, and technology to identify and eliminate gaps in enterprise security program.

Join Martin’s Point Health Care CISO, Matthew Witten and IT Security Architect, Brandon Bergman, along with Endgame Sr. Threat Researcher, Paul Ewing, to discuss how security leaders should chose a model with the broadest scope to stop targeted attacks. In this webinar, they will discuss: 

  • The highest resolution attack model - MITRE ATT&CK Matrix 
  • Criteria to evaluate endpoint security products
  • How Endgame’s endpoint protection platform stops targeted attacks

 

More Info

Sponsored by: Endgame

20/20 Webcast

The clock is ticking on GDPR

This 20/20 webcast looks at how you should prioritize your time between now and next May to reduce your vulnerability.

x

The clock is ticking on GDPR

GDPR is right around the corner. Technology and legal experts say it will take an average company one to two years to become compliant – you have roughly six months. Today’s 20/20 webcast looks at how you should prioritize your time between now and next May to reduce your vulnerability.
More Info

Sponsored by: Rapid7

Vendor Webcast

Fact or Fiction: The state of GDPR compliance explained

Join guest speaker Enza Iannopollo, analyst from Forrester, to hear about the latest findings of their research and benchmark yourself against your peers.

x

Fact or Fiction: The state of GDPR compliance explained

The General Data Protection Regulation (GDPR) is approaching fast and organizations worldwide have a short time left to get ready to meet new compliance requirements. For many organizations, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversight mechanisms. For all organizations, GDPR demands they find new ways to design privacy into what they do, encouraging collaboration across teams, and promoting a corporate culture that places the protection of EU citizen and resident data at its core.

A new study conducted by Forrester Consulting and commissioned by RSA unveils the state of GDPR compliance around the world. From breach notification to the right to be forgotten, to record keeping duties, the study -- completed in October 2017 -- provides an in-depth view of the level of maturity of organizations’ compliance strategies across GDPR requirements just a few months before enforcement begins. Join guest speaker Enza Iannopollo, analyst from Forrester, to hear about the latest findings of their research and benchmark yourself against your peers.

More Info

Sponsored by: RSA

20/20 Webcast

Morphing Network Security

This 20/20 will look at how traditional and emerging technologies are melding to change the security environment and how companies can cope.

x

Morphing Network Security

If you were a security analyst from five years ago and were dropped into a data center today, you’d be as lost as if you were from the Moon. Technological changes happen in the blink of an eye, yet the basic tenants of TARR -- Test. Analyze. Remediate. Repeat -- remain the same. It’s the testing and analyzing parts that are changing at light speed. Today’s 20/20 will look at how traditional and emerging technologies are melding to change the security environment and how companies can cope.
More Info

Sponsored by: Bricata

Vendor Webcast

Attackers enter here → endpoint devices

It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.

x

Attackers enter here → endpoint devices

70% of breaches start on endpoint devices.  Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection.  
 
And reacting to malicious communications and code after attacks launch is simply too late.
 
It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.
 
Join Cisco security product experts, Meghan Diaz and Joe Malenfant to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.
 
Register today and reduce your risk of breaches on the endpoint.

More Info

Sponsored by: Cisco

Vendor Webcast

4 Ways to Operationalize NIST CSF to Improve Your Security Posture

Join Vivek Shivananda, CEO and Co-Founder of Rsam, as he best practices for operationalizing NIST CSF.

x

4 Ways to Operationalize NIST CSF to Improve Your Security Posture

Organizations everywhere struggle to stay on top of the expanding scope of risk. The NIST Cybersecurity Framework is becoming widely adopted as a means to reel in the many moving parts. But the fundamental question most security leaders struggle to answer is: How are we doing against NIST Cybersecurity?

Join Vivek Shivananda, CEO and Co-Founder of Rsam, as he best practices for operationalizing NIST CSF. He'll identify common challenges and give prescriptive suggestions on a phased approach for successful implementation.

More Info

Sponsored by: Rsam

20/20 Webcast

Compliance Conundrum

This 20/20 webcast looks at compliance, why it is important and what you need to know today about how compliance is impacting your company and your future.

x

Compliance Conundrum

These days compliance requirements are everywhere. Various state and federal agencies have strict requirements, especially in such industries as healthcare, financial and insurance. Industry organizations add another layer of compliance requirements that while they might not involve legal penalties, they can carry fines. Even foreign governments are getting into the US compliance mix. The General Data Protection Regulation from the EU carries some of the largest fines globally for privacy violations. Today’s 20/20 webcast looks at compliance, why it is important and what you need to know today about how compliance is impacting your company and your future.

More Info

Sponsored by: Yubico

Vendor Webcast

The Business Risk Management Dirty Half Dozen: 6 Things You Need to Succeed

Join us for this live webcast where we will highlight six major concepts you need to consider when building out your risk management strategy.

x

The Business Risk Management Dirty Half Dozen: 6 Things You Need to Succeed

In today’s hyper expansive and unpredictable market, it isn’t sufficient to be ‘just good enough’ when it comes to managing risk.  Every day, in organizations around the globe, risk, compliance, security and GRC champions are being asked questions they can’t answer. The pressure to provide your business with key insights into risk is building and, without a well thought out approach, you can unfortunately end up making insignificant progress and providing little value to the organization.  

Join us for this live webcast where we will highlight six major concepts you need to consider when building out your risk management strategy. This session will cover: 

• The journey many companies take when building their programs
• Key factors when evaluating technology strategies to support your risk management program
• Critical dimensions to measure your progress and obstacles to avoid

More Info

Sponsored by: RSA

Vendor Webcast

Top 5 Strategies to Prevent Ransomware

Erich Kron, Security Awareness Advocate at KnowBe4 will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help...

x

Top 5 Strategies to Prevent Ransomware

It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight.

Join us for this webinar “Top 5 Strategies to Prevent Ransomware”, on Friday, October 27th at 2:00 pm EDT. Erich Kron, Security Awareness Advocate at KnowBe4 will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help you prevent ransomware.

Erich will cover:
  • The new scary Ransomware trends out in the wild
  • How to eliminate or reduce damage from ransomware
  • How to fortify your last line of defense—your end users
More Info

Sponsored by: KnowBe4

Editorial Webcast

Next Generation Threat Intelligence

What we can expect from the threat intelligence technology and how it will play a part in a company’s overall information security strategy.

x

Next Generation Threat Intelligence

We’ve talked in previous webcasts about what threat intelligence is and how to use it. We complete this series by taking a look forward – what we can expect from the threat intelligence technology and how it will play a part in a company’s overall information security strategy.
More Info

Sponsored by: Recorded Future

20/20 Webcast

Forget Papers, Validate Data Bits Please

This 20/20 webcast looks at how CISOs can build security validation into their networks and why this is important.

x

Forget Papers, Validate Data Bits Please

It’s one thing to put a security validation program in place to watch over your defenses, but quite another to ensure that that your threat detection systems are indeed finding the potential data breaches and stopping them before they take a foothold – or perhaps better to say a bit-hold. Today’s 20/20 webcast looks at how CISOs can build security validation into their networks and why this is important.

More Info

Sponsored by: Scythe

20/20 Webcast

Next-gen identity management

This 20/20 looks at what ID proofing means in the real world.

x

Next-gen identity management

It is no longer enough simply to think your users are really your users. User names are easily guessed and passwords are easily breached. The answer, of course, is that identity and access management software need to be absolutely certain that the identity is correct and not an attacker pretending to be the authorized users. This identity proofing, as the technology is known, incorporates a combination of multifactor authentication technologies including physical, biometric, behavioral analytics, device-level analytics, and perhaps even a successor to the username/password paradigm we’ve used for the past 50-plus years. Today’s 20/20 looks at what ID proofing means in the real world and how companies will go about ensuring that a user’s identity is accurate and not an imposter trying to breach legitimate credentials.
More Info

Sponsored by: Yubico

20/20 Webcast

Know Your Ransomware Enemy

This eBook (and corresponding 20/20 webcast) will look at the realities of ransomware.

x

Know Your Ransomware Enemy

It should come as no surprise to anyone that ransomware has become the hackers’ favored option these days. If you buy in to the scare tactics about ransomware, it’s easy to create, has a high profile in the media and can be lucrative.  But like everything else in the data security world, nothing is ever as simple as it seems. This eBook (and corresponding 20/20 webcast) will look at the realities of ransomware, including the real and imagined difficulties of defending against it, the support needed on the attacker’s side to make ransomware effective and tactics victims can take to rid themselves of the malware.
More Info

Sponsored by: PhishMe

Vendor Webcast

2017 State of Cybercrime Report Webcast: Exposing the threats, techniques and markets that fuel the economy of cybercriminals

Recommended strategies for organizations to pursue to prevent, detect, respond to and predict the latest cybercriminal activity threats.

x

2017 State of Cybercrime Report Webcast: Exposing the threats, techniques and markets that fuel the economy of cybercriminals

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
 
In our “2017 State of Cybercrime” report, we shared several key findings and intelligence which stems from the visibility gained from criminal forum monitoring, our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants.
 
Secureworks Senior Security Researcher, Keith Jarvis, will analyze the key findings from our research and will cover recommended strategies for organizations to pursue to prevent, detect, respond to and predict the latest cybercriminal activity threats.
 
During this live webcast we will cover:
 
  • Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
  • Cybercrime categories and the significant risk to individuals ad organizations
  • The complexity of the criminal landscape and diverse capabilities of threat actors
  • The continuation of online crime as a market economy

More Info

Sponsored by: SecureWorks

Vendor Webcast

Blazing the trail: Changes facing the cybersecurity industry

A roundtable discussion hosted by women leading in cybersecurity.

x

Blazing the trail: Changes facing the cybersecurity industry

Join women leading in cybersecurity, Julie Tsai, Sr. Director, Security Operations at Box and Michelle Dennedy, Chief Privacy Officer at Cisco, on Thursday, October 19th for a lively roundtable discussion on security and data privacy. They will offer us their perspective on their success, lessons learned in their careers and how women are making their mark on the security industry, in addition to debating key changes and trends facing the cybersecurity industry and how we approach data privacy.
 
Register now to join the discussion.

More Info

Sponsored by: Cisco Umbrella

Vendor Webcast

Managing the Challenges of GDPR: Osterman Research Survey Results

Join us to explore how the GDPR will impact your business and how you can comply with the key provisions of this landmark requirement before the May 25, 2018 deadline...

x

Managing the Challenges of GDPR: Osterman Research Survey Results

The GDPR has important implications for every business, even for those that have no operations in Europe. However, Osterman Research has found that even with implementation of the GDPR just seven months away [at the time of the webinar], many businesses are not well prepared to meet the compliance obligations of this critical requirement. A failure to meet the obligations of the GDPR can have devastating financial consequences for an organization, yet compliance with it will have positive spillover effects on an organization’s information governance, archiving, security and other capabilities. Join us to explore how the GDPR will impact your business and how you can comply with the key provisions of this landmark requirement before the May 25, 2018 deadline.
More Info

Sponsored by: RSA

Vendor Webcast

Tackling Identity Risks in Today’s Modern IT Landscape

Overcome the challenges associated with managing access and identity risk

x

Tackling Identity Risks in Today’s Modern IT Landscape

In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We’re opening up access to a growing and dynamic user population that includes not only employees but partners, customers, channels and contractors. And, while the always-on mobile and BYOD landscape offers much-needed convenience for users, it further blurs personal and corporate access boundaries. Ultimately, we need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s seamless and easy for our users.

Is this mission impossible? One might think so, especially as the business and IT landscapes continue to evolve, hosting a proliferation of access points, applications and islands of identity. IT has less and less centralized control and visibility and the bad guys have more opportunities to gain unauthorized access through those access blind spots of ours. Only by effectively getting a grasp on our identity risks can we gain a sense of identity and access assurance. But, what are those risks and how do we get ahead of them to mitigate the risks of any breaches, audit failures and business slowdowns? 

Join our upcoming webinar with Tim Norris, Product Marketing at RSA, where you will learn how to: 

  • Overcome the challenges associated with managing access and identity risk 
  • Effectively identify and quantify identity risks at your organization
  • Implement a strategy to address the critical risk factors
  • Enhance your visibility into adjacent risk factors

 



 

More Info

Sponsored by: RSA

Vendor Webcast

Will 2018 be The Year of the Threat Actor?

Join subject matter experts from DomainTools in a lively discussion of what's next for information security.

x

Will 2018 be The Year of the Threat Actor?

2017 isn't over and we have already seen a massive increase in the number and types of infosecurity threats from ransomware to phishing to data breaches.  So what will 2018 bring and what can be done to prevent the next wave of cyber attacks?

Join subject matter experts from DomainTools in a lively discussion of what's next for information security. CTO Bruce Roberts, VP of R&D Michael Klatt, Senior Security Researcher Kyle Wilhoit, and Director of Product Management Tim Helming will conduct a round-table discussion on their infosecurity predictions . Highlights will include:
  • We're All Living In Denial (of Service)
  • Armies of Things
  • We're From The Government And We're Here To Help...Except When We're Not
More Info

Sponsored by: DomainTools

20/20 Webcast

Making Data Security's Business Case

This 20/20 webcast looks at how and why to build a business case for information security for senior management.

x

Making Data Security's Business Case

There are a lot of reasons why companies will want to ensure their data is secure. Certainly no one wants to be on the prime time cable news shows being identified as yet another breached company, nor does anyone want to deal with customer law suits. And, of course, there’s compliance. Today’s 20/20 webcast looks at how and why to build a business case for information security for senior management.
More Info

Sponsored by: Protegrity

Vendor Webcast

Simplify PKI Certificate Management or Best Practice Certificate Management

Join us to discover how best practice certificate management can help you simplify and streamline your PKI implementation

x

Simplify PKI Certificate Management or Best Practice Certificate Management

You’re facing critical challenges in your digital business deployment. You must protect the enterprise by safeguarding your devices, networks and data. But you also need to move quickly and fearlessly in order to compete.

PKI is the critical underpinning to help organizations succeed as they roll out new digital business models.  But, as Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things” (August, 2016), certificate management is the issue for which clients seek the most guidance, and it is becoming increasingly important.

This webinar discusses :

·         Elements that make up good certificate management

·         Defining assurance levels

·         Manual vs automated certificate management

·         Certificate discovery & migration

Join us to discover how best practice certificate management can help you simplify and streamline your PKI implementation and build a better approach to manage trust and accelerate your digital business.

More Info

Sponsored by: Entrust

20/20 Webcast

Silver Lining or Rain Clouds Ahead?

This 20/20 webcast looks at approaches to addressing the many challenges around cloud security management.

x

Silver Lining or Rain Clouds Ahead?

As organizations migrate workloads to cloud computing, they aim to benefit from flexibility and agility, but network security operations grow increasingly difficult. Gaining visibility into cloud environments, extending existing security operations, ensuring identity and access management, meeting the array of compliance requirements and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud. Today’s 20/20 webcast looks at approaches to addressing the many challenges around cloud security management and recommendations for translating on-prem security controls and processes into hybrid and multi-cloud environments.
More Info

Sponsored by: Skybox

Vendor Webcast

Machine Learning and A.I. in Cybersecurity: Separating Myth from Reality

How security teams can effectively deploy security analytics to enhance the efficient detection and prevention of advanced cyber threats.

x

Machine Learning and A.I. in Cybersecurity: Separating Myth from Reality

Big-data security analytics, machine learning, artificial intelligence, and other technologies have emerged as new and powerful components in the information-security arsenal. When applied properly, machine learning and A.I. can certainly be essential components of an effective security strategy.
 
But you need to see through the hype. What do the terms “machine learning” and “A.I.” really mean? What do words like “unsupervised machine learning” really mean? And how do these techniques really apply to cybersecurity?
 
Join guest speaker Dr. Chase Cunningham, Principal Analyst at Forrester Research, and Stephan Jou, Interset’s CTO, as they define and explore the strengths (and limitations!) of machine learning and A.I. They’ll also discuss how security teams can effectively deploy security analytics to enhance the efficient detection and prevention of advanced cyber threats.
 
Register for this webinar to learn:
• What machine learning and A.I. are, what the various buzzwords you’ve heard really mean, and the strengths and limitations of each
• Which analytical techniques apply to which security use cases
• Best practices to help you understand and evaluate security-analytics solutions
• Actual real-life examples of successful deployments of machine learning and user behavioral analytics

More Info

Sponsored by: Interset

20/20 Webcast

Ransomware -- Malware's Next Generation

This 20/20 webcast looks at the business model behind ransomware, offers recommendations on actions you can take today to give yourself a stronger defensive posture...

x

Ransomware -- Malware's Next Generation

When Willie Sutton was asked by police why he robbed banks, his answer was simple and direct: That's where the money is. Today cyber thief has a similar business model and they don't need to be a programming guru or a master criminal -- they just need to know a little bit about human nature and have access to ransomware that is readily available. Well, perhaps not. Today's 20/20 webcast looks at the business model behind ransomware, offers recommendations on actions you can take today to give yourself a stronger defensive posture against ransomware and suggestions on what to do if ransomware hits.
More Info

Sponsored by: Forcepoint

20/20 Webcast

Myths & Realities of MFA

This 20/20 webcast looks at some of the challenges CISOs face in implementing multifactor authentication across multiple platforms.

x

Myths & Realities of MFA

The day of the username and password is long gone. Various approaches to multifactor authentication are promoted these days from the traditional key fob or token to cell phone apps to more exotic approaches. The bottom line, however, is that passwords alone just won’t cut it in the days of sophisticated phishing and spoofed email and social engineering attacks. Today’s 20/20 webcast looks at some of the challenges CISOs face in implementing multifactor authentication across multiple platforms, real and imagined issues involving user acceptance, and the very real requirements compliance officers face today.
More Info

Sponsored by: OneLogin

Vendor Webcast

Security Automation and Orchestration Best Practices

Automation and orchestration do not need to be end-to-end to help your team be more effective.

x

Security Automation and Orchestration Best Practices

The volume and complexity of security threats combined with the difficulty of hiring and retaining security talent is pushing security organizations to look towards automation and orchestration for improved effectiveness.  Security teams have been skeptical of automation and orchestration as most think of it as being “end-to-end” and experienced security professionals know the work is harder than that.
 
Automation and orchestration do not need to be end-to-end to help your team be more effective.  There are portions of the security incident and vulnerability response process that can be easily automated in a risk-free manner, eliminating boring, mundane, manual work and allowing analysts to spend their time solving real problems.
 
Join guest speaker Joseph Blankenship, Forrester Senior Analyst and Piero DePaoli, Senior Director from ServiceNow’s Security Operations team as they discuss and demonstrate the following:
  • Creating a security automation and orchestration strategy
  • Ensuring automation and orchestration is part of a broader enterprise security response program
  • Sample use cases to get started

More Info

Sponsored by: ServiceNow

Vendor Webcast

A High Wire DDoS Act

Join this session for a discussion of the expectations around response strategies and approaches in the face of evolving threats.

x

A High Wire DDoS Act

The DDoS risk curve in 2017 looks very different than only five years ago. The Stakes Have Changed around the that threat capability continuum as attacks in size, frequency and complexity have evolved. Join this session for a discussion of the expectations around response strategies and approaches in the face of evolving threats.
More Info

Sponsored by: Arbor Networks

20/20 Webcast

Securing your Nimbus

This 20/20 webcast puts a framework around a term that has become ubiquitous even though its definition is not.

x

Securing your Nimbus

The phrase de jour is Cloud Security. Everyone talks about it and everyone assumes the people they're talking to have the same frame of reference, but that's not always so. Today's 20/20 webcast puts a framework around a term that has become ubiquitous even though its definition is not.
More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Best Practices and Future Direction of Security Awareness Training

Emerging industry trends and provides the actionable information you need to train your last line of defense, your employees.

x

Best Practices and Future Direction of Security Awareness Training

While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.

In this webinar “Best Practices and Future Direction of Security Awareness Training”, Erich Kron CISSP, Security Awareness Advocate for KnowBe4, discusses emerging industry trends and provides the actionable information you need to train your last line of defense, your employees.

Erich will cover these topics:
  • Practical security awareness and behavior management tips
  • Outlining how and where tools are helpful
  • Emerging industry trends
  • How to create a “human firewall”
More Info

Sponsored by: KnowBe4

20/20 Webcast

Deconstructing Insider Attacks

This 20/20 webcast looks at techniques you can use to identify insider attacks and distinguish a malicious attack from a non-malicious one

x

Deconstructing Insider Attacks

We’ve seen it happen too many times. An employee has too much on their plate for one day so they need to take work home with them. Unfortunately, the files they need to work on are confidential or otherwise protected on the network so the employee just copies them to a thumb drive. An executive might take confidential data home for non-malicious reasons. Today’s 20/20 webcast looks at techniques you can use to identify insider attacks and distinguish a malicious attack from a non-malicious one, as well as using behavioral analysis to separate attacks from regular user activity.
More Info

Sponsored by: Bay Dynamics

Vendor Webcast

Improve your Cyber Defenses through Penetration Testing: What you need to know to keep your enterprise secure

In this webcast, join cyber expert and penetration tester, Lee Nichol, for a penetration testing deep dive.

x

Improve your Cyber Defenses through Penetration Testing: What you need to know to keep your enterprise secure

In this webcast, join cyber expert and penetration tester, Lee Nichol, for a penetration testing deep dive. He will discuss the importance of leveraging penetration testing as part of your overall security strategy and the benefits of different types of penetration tests. Lee will review important considerations when evaluating your penetration testing needs in order to get the most out of your investments.  Attendees will learn: 

  • How to incorporate penetration testing into your overall security program based on external factors and internal requirements
  • Understanding Quality – Burgeoning standards and certifications for testing teams
  • Where penetration testing can fail to meet expectations
  • Purple team: The medium-term future of White Box high-value offensive testing
  • Designing a scope to fit your needs – how to get the most value for your organization to detect threats and prevent future incidents
More Info

Sponsored by: Leidos

20/20 Webcast

Ever changing Endpoint Security

This 20/20 looks at why malware works, why many of the common-sense defenses don’t and what CISOs should do about it.

x

Ever changing Endpoint Security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works. Today’s 20/20 looks at why malware works, why many of the common-sense defenses don’t and what CISOs should do about it.
More Info

Sponsored by: McAfee

Vendor Webcast

Securing Single Page Applications

Join this webcast to learn how to security test each of the following application layers of a SPA

x

Securing Single Page Applications

In recent years, there have been a number of fundamental changes in web standards such as those in HTML5 and HTTP that have created powerful new concepts that have opened doors to new possibilities for web development. Single Page Application (SPA) frameworks have taken advantage of all these new technologies - all at once - to enable developers to build feature rich applications, but in doing so they have created tremendous challenges for application security experts.

Join this webcast to learn how to security test each of the following application layers of a SPA:

• Interface layer: Become familiar with SPA frameworks (AngularJS, ReactJS)
• Backend layer: Dig into different REST API's and learn how they are used and where to find the weaknesses
• Network layer: Learn more about WebSockets and how they fundamentally change TCP/HTTP
• Interconnectivity layer: Get to know how SPA's are often internconnected with 3rd party API's or presentation elements

More Info

Sponsored by: Rapid7

Vendor Webcast

User Authentication Trends 2017 Blurred Boundaries & New Methods

Get up-to-date on the 2017 user authentication trends and learn to address some of the most popular authentication questions

x

User Authentication Trends 2017 Blurred Boundaries & New Methods

A vanishing perimeter and the continuing explosion of cloud-based applications and mobile devices are blurring old boundaries - creating more islands of identity and forcing organizations to reimagine its identity and access strategies.  

As cybersecurity incidents rise to record levels, consumers and businesses scramble to keep their most sensitive information private. 

Get up-to-date on the 2017 user authentication trends and learn to address some of the most popular authentication questions including: 
• What’s next for multi-factor authentication (MFA)?
• Can single sign-on (SSO) provide a balance of convenience and security?
• Will biometrics (finally) live up to the hype?
• How will risk change the authentication game?

More Info

Sponsored by: RSA

20/20 Webcast

Scaling Network Security

This interactive 20/20 webcast looks at the challenges of scaling a network correctly and making sure that security is baked in, not stapled on.

x

Scaling Network Security

Building a scalable network today in some ways is easier than in the past, but in others it’s far more complex. Moving applications and storage to the cloud is simple, but can be challenging when it comes to compliance and data security. Ad hoc cloud use conducted without IT oversight could violate various laws and regulations, but if no one tells IT and risk, it could go undiscovered until it’s breached. Today’s 20/20 webcast looks at the challenges of scaling a network correctly and making sure that security is baked in, not stapled on.
More Info

Sponsored by: Forcepoint

Vendor Webcast

What’s on your Network?  4 Steps to Delivering a Practical, Resilient and Scalable Endpoint Security Strategy

In this webcast, enterprise security and network infrastructure leaders will learn about next-generation security innovations that deliver endpoint discovery, visibility...

x

What’s on your Network? 4 Steps to Delivering a Practical, Resilient and Scalable Endpoint Security Strategy

With mounting cybersecurity threats, aging network security infrastructure, and an explosive growth in unmanaged endpoints and “IoT” (Internet of Things) devices, enterprise IT leaders are facing unprecedented security risk -- and regulated industries, such as finance and healthcare, face an even steeper challenge.  Recent research indicates that up to 90 percent of devices on an enterprise network today are unknown or unmanaged, and a massive security breach is only a matter of time.  Is your company at risk?
 
In this webcast, enterprise security and network infrastructure leaders will learn about next-generation security innovations that deliver endpoint discovery, visibility and control – and how these capabilities are fundamental to a secure, scalable and resilient network.  Those who attend will come away with proven and practical knowledge on how to:
  • Remove network “blind spots” in minutes – and streamline compliance as a result
  • Mitigate future risk with device behavior monitoring – and reduce expensive, time-intensive manual processes
  • Enhance current security infrastructure, such as SIEM and CMDB – for improved protection and a higher ROI
  • Embrace internal IoT initiatives with confidence – take back network control, no matter where IoT innovations are initiated
More Info

Sponsored by: Great Bay

Vendor Webcast

Are you ready for GDPR? 5 Tips to Accelerate Your GDPR Strategy

Join us for this interactive webcast where we will discuss tips for accelerating your GDPR readiness.

x

Are you ready for GDPR? 5 Tips to Accelerate Your GDPR Strategy

The General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. As a regulation, as opposed to a directive, it will directly impose a uniform data security law on all EU members and will also apply to non-EU companies if they process personal data of EU individuals. The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the new law.

 Preparing for GDPR is no small task – the regulation requires organizations to know exactly what, when, and where they are collecting information from covered persons, processing the information, storing the information (and how long), and sending information to others, including across borders. This, in addition to the fact that organizations could be liable for fines of up to 4% of annual global revenue (or €20 million whichever is greater), has propelled data protection directly into the boardroom.

 What does this mean for your organization? Join us for this interactive webcast where we will discuss tips for accelerating your GDPR readiness, including:

  • Understanding GDPR and why it presents the most significant change to data protection in the EU since 1995
  • Four key areas you need to focus on as you prepare for GDPR
  • A maturity based approach to building a sustainable GDPR strategy

 

More Info

Sponsored by: RSA

20/20 Webcast

Executive Decision

This 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can...

x

Executive Decision

Cyber Security is on everybody’s minds these days. You can’t log in to your favorite web-based news site, it seems, without seeing a warning about ransomware, spear phishing, social engineering attacks or CEO fraud. Attackers have all the time in the world to create very targeted attacks, yet employees have seconds to decide if they will open an email, click on an attachment or even worse, install an “upgrade” supposedly sent by their IT department or software vendor. Today’s 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can defend against them.
More Info

Sponsored by: KnowBe4

Vendor Webcast

Results from 2017 Thycotic Black Hat Survey Report: Top takeaways from the attendees

Join Thycotic’s Chief Security Scientist as we cover the top takeaways from this years’ Black Hat conference and our just released Black Hat 2017 Attendee Survey...

x

Results from 2017 Thycotic Black Hat Survey Report: Top takeaways from the attendees

Every year thousands of IT security professionals head to Black Hat in Las Vegas to attend the biggest event of the year in cybersecurity to stay ahead of the ever-changing security landscape.  The recent global cyber threats from the highly publicized WannaCry and NotPetya ransomware attacks have only increased the importance of these gatherings.

Join Thycotic’s Chief Security Scientist as we cover the top takeaways from this years’ Black Hat conference and our just released Black Hat 2017 Attendee Survey Report.  Get the expert opinions on:

  • What types of cybersecurity defences are easiest to hack
  • The worst (least effective) security controls for protecting endpoints
  • The biggest sources of cybersecurity fatigue among users
  • Who/what is most responsible for unauthorized access to critical information assets

 

Every webinar registrant will receive a free copy of the Thycotic 2017 Black Hat Survey Report.

More Info

Sponsored by: Thycotic

Vendor Webcast

The Future of Authentication with FIDO

We invite you to learn about Microsoft’s efforts to meet the IT security challenge, the benefits of leveraging and creating open standards, and the high security...

x

The Future of Authentication with FIDO

BYOD and cloud computing pose a longstanding challenge for the IT industry at large to secure multiple platforms, operating systems, and applications. The FIDO Alliance, a consortium of technology companies with members like Microsoft and Google, answers the growing need for account security with FIDO authentication.

Following the game-changing Microsoft demo of FIDO 2.0-based passwordless login at CIS, Yubico looks ahead to a brighter, more secure future for FIDO authentication. Yubico collaborates with industry leaders like Microsoft and the FIDO Alliance to create new open authentication standards, and provide a safer internet space for users across the globe.

As Microsoft moves towards Modern Authentication with passwordless logins (#1BillionBy2018), we invite you to learn about Microsoft’s efforts to meet the IT security challenge, the benefits of leveraging and creating open standards, and the high security of public key cryptography with FIDO 2.0.


 

More Info

Sponsored by: Yubico

Vendor Webcast

The Next Evolution of Malware

Register for this webinar with BluVector’s Chief Technology and Strategy Officer to learn how damaging destructive malware can be.

x

The Next Evolution of Malware

Malware has become the new weapon of choice for cybercriminals. It enables even non-technical criminals to produce highly effective and profitable cyberattacks with little effort. If you’re not already working to protect your network, you’re already at risk.

 Register for this webinar with BluVector’s Chief Technology and Strategy Officer to learn:

  • How damaging destructive malware can be
  • How this new malware operates
  • Why your current malware detection will likely miss destructive malware
  • How newly developed techniques with supervised machine learning can help detect destructive malware
More Info

Sponsored by: BluVector

Vendor Webcast

Planning for Failure: Building Processes for Security Success and Response

Tune into this webcast as we discuss what has been successful in the past, areas of improvement, and share tactics for program growth.

x

Planning for Failure: Building Processes for Security Success and Response

As attackers get smarter and security is continuously on the front page, IT teams are faced with 2 key question: Is my program successful? and Am I covered if it fails?

Tune into this webcast as we discuss what has been successful in the past, areas of improvement, and share tactics for program growth.

This webcast will also review:

  • How to build and measure the success of a proactive security program
  • War stories from when events inevitably happen
  • How to address, respond, and mitigate incidents in the future.
More Info

Sponsored by: Rapid7

Vendor Webcast

3 Key Principles for Managing Cloud Security Risk

Join Hadi Hosn, Head of Security Strategy & GRC Consulting in EMEA, as he explains why cloud security is so important, and provides guidance on key considerations...

x

3 Key Principles for Managing Cloud Security Risk

Whether you’re pro cloud or not, the security industry is being cloudified.

As IT moves into the cloud, security must follow, and with IT losing its grip on the endpoint, cloud is the only security option.

In addition, the Internet of Things continues to scale upwards, and cloud computing will be its data repository, application engine, provisioning system, and security platform.

Join Hadi Hosn, Head of Security Strategy & GRC Consulting in EMEA, as he explains why cloud security is so important, and provides guidance on key considerations when building out a cloud security program.

In this webcast you will learn:

  • 3 key principles for managing cloud security risk
  • 5 common misconceptions and how to avoid them
  • The 5 fundamental cloud security controls you should implement
More Info

Sponsored by: SecureWorks

Vendor Webcast

7 Steps to Build a GRC Framework for Business Risk Management

Join Marshall Toburen, GRC Strategist for RSA Archer®, as he shares a seven-step methodology for a GRC-based business risk management framework.

x

7 Steps to Build a GRC Framework for Business Risk Management

Look at information security through the lens of business risk, and you’ll begin to make decisions about security in light of their impact on the business. With security threats emerging faster than ever, what information is most important to protect? What happens if it’s not protected? What strategic business advantage do you gain if it is protected?

 

To find the answers, you need a GRC framework for business risk management within which you can identify key business priorities and align them with security information and decisions.

 

Join Marshall Toburen, GRC Strategist for RSA Archer®, as he shares a seven-step methodology for a GRC-based business risk management framework, including tips for:

  • Defining what information needs to be protected and identifying the location and amount of important information
  • Establishing a “risk tolerance” and understanding your organization’s cyber risk appetite
  • Conducting information risk assessments to help determine levels of inherent and residual risk
More Info

Sponsored by: RSA

Editorial Webcast

 Real World Threat Intelligence

Today’s webcast looks at what you need to build out a threat intelligence infrastructure, potential sources of threat data sources, and recommendations on staff...

x

Real World Threat Intelligence

Today CISOs live in a world where more data doesn’t necessarily mean better data. For those trying to separate the wheat from the chaff, having reliable threat intelligence data feeds, as well as the trained staff who can recognize an anomaly from a busy server is essential. Today’s webcast looks at what you need to build out a threat intelligence infrastructure, potential sources of threat data sources, and recommendations on staff training.


 

More Info

Sponsored by: Recorded Future

Vendor Webcast

Expert Panel: Bug Bounty Trends and What They Mean

Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report.

x

Expert Panel: Bug Bounty Trends and What They Mean

Traditional methods for vulnerability discovery are failing us. With rapidly expanding attack surfaces, motivated adversaries, and the growing shortage of full-time infosec professionals, organizations are fighting a losing battle. One thing is clear: We need a new approach.
 
Enter the Bug Bounty model. Bug bounties have quickly evolved from a “nice to have” to a “must have” for most application security teams.
 
What’s behind this trend? Why are bug bounties growing, and why now?
 
Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report. 

More Info

Sponsored by: Bugcrowd

Vendor Webcast

Protecting Unified Communications Networks: What Network Security Teams Need to Know

This webinar describes the differences between real-time UC applications and traditional data applications that make it imperative to take a collaborative security...

x

Protecting Unified Communications Networks: What Network Security Teams Need to Know

Thrust together by a common IP network, UC and network teams must collaborate to ensure mission critical voice, video and unified communications (UC) systems are protected from increasingly potent threats. Many organizations are putting themselves at risk of attack, without adequate tools to protect themselves on all levels. Targeted at network security professionals, this webinar describes the differences between real-time UC applications and traditional data applications that make it imperative to take a collaborative security approach. You will learn:

  • What’s at risk for organizations that deploy real-time communications applications over the corporate LAN/WAN
  • Why traditional security architectures are not effective – and even harmful – for communications applications
  • Architectural strategies to close network security gaps
More Info

Sponsored by: Oracle

Vendor Webcast

Slaying the Paper Dragon: Risk on Paper vs. Real Risk

How mitigation of vulnerabilities can harden attack surface and reduce risk.

x

Slaying the Paper Dragon: Risk on Paper vs. Real Risk

Many organizations’ vulnerability management efforts are designed to slay the paper dragon – focusing on vulnerabilities that pose a high risk in theory. Yet analysis of real world threat actors and their tactics, techniques, and procedures, as well as the vulnerabilities associated with these, demonstrate that this approach only reduces risk on paper. Vulnerability management is not a game of solitaire – there is an adversary dictating the rules of engagement – and the only aspect you control is the battlefield itself, your environment.  In this webinar renown cyber security expert, Dr. Danny Quist, discusses how measuring risk posture and vulnerability criticality change once threat intelligence and risk modelling are taken into account, and how the strategic mitigation of these vulnerabilities can effectively harden your attack surface and reduce your true risk.
More Info

Sponsored by: RiskSense

Vendor Webcast

It’s Not All Gloom and Doom: Security and Development Are More Aligned Then Ever

Despite the popular belief that security and dev teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product innovation...

x

It’s Not All Gloom and Doom: Security and Development Are More Aligned Then Ever

Despite the popular belief that security and development teams have conflicting priorities, initiatives such as creating DevOps environments and focusing on product innovation have the two teams aligned toward a common goal of creating secure software. As software continues to be the major driver of innovation and economic growth, eliminating the perception of friction between security and development is a priority for IT professionals. In a recent study conducted between Enterprise Strategy Group (ESG) and Veracode, it was reported that 58 percent of respondents stated their organization is taking a collaborative approach to securing applications.

Join Doug Cahill, ESG Senior Analyst and Pete Chestna, Veracode’s Director of Developer Engagement as they take a deeper dive into the results of this survey.

During this webinar you will learn:
Why the need to establish accountability and empathy between security and development teams is critical to creating successful DevOps environments

  • How the evolving relationship between Security and Development is pushing the need for operationalizing AppSec with DevOps, creating “DevSecOps”
  • How the ability to integrate security practices into the software development lifecycle and report across organizational boundaries can increase the rate of product deliver, strengthen competitive advantage, and ensure compliance
More Info

Sponsored by: Veracode

Vendor Webcast

Managed Detection & Response (MDR) Drives Incident Prevention

The cybersecurity market is shifting. Today’s ever-evolving threat landscape is driving organizations to change how they address incident prevention.

x

Managed Detection & Response (MDR) Drives Incident Prevention

According to Gartner in the Global MSSP Magic Quadrant report, "65% of MSSP's by 2020 will offer Managed Detection & Response (MDR)." The cybersecurity market is shifting. Today’s ever-evolving threat landscape is driving organizations to change how they address incident prevention.

Managed Detection & Response (MDR) goes beyond traditional Managed Security Service Providers (MSSP) or Incident Response (IR) services to provide a continuous end-to-end approach that detects malicious threats earlier, provides comprehensive analysis of the intrusion, and delivers actionable guidance for future prevention based on intelligence actionable guidance for future prevention based on intelligence gained.  It is imperative that organizations evolve beyond employing traditional managed security and incident response services. In this webcast, you will learn:

  • Why an MDR service is a crucial component to detecting malicious threats earlier and preventing future incidents
  • How MDR can improve situational awareness by maximizing visibility into threats
  • How organizations can use MDR to enhance their cybersecurity maturity and keep ahead of a rapidly evolving threat landscape
More Info

Sponsored by: Leidos

Vendor Webcast

Exploiting the Adversary: How to Be Proactive with Threat Intelligence

Gain insight into the latest threats and their attack patterns

x

Exploiting the Adversary: How to Be Proactive with Threat Intelligence

Understanding your adversary is essential to effective cybersecurity. In order to block threat actors, now and in the future, you must know where they have been before, what their techniques, tactics, and procedures are, and if they are targeting your specific organization.

Many organizations are ingesting threat intelligence, but aren’t aware of how to use that information to perform additional analysis.

 In the webinar, you will learn how to:

  • Gain insight into the latest threats and their attack patterns
  • Leverage threat intelligence and perform additional analysis
  • Exploit the attack patterns of Fancy Bear and Carbanak against themselves

 

 

 

More Info

Sponsored by: ThreatConnect

Vendor Webcast

Countdown to Regulatory Compliance: Is Your Organization Ready for GDPR & NIST?

Join us for one hour to hear from three experts on what you need to know to get ready for GDPR and NIST before the deadline.

x

Countdown to Regulatory Compliance: Is Your Organization Ready for GDPR & NIST?

Whether your business resides in the US or Europe, or just does business in these regions, regulations such as General Data Protection Regulation" (GDPR) and National Institute of Standards and Technology (NIST) will impact how you do business and with whom you will do business. But what if you could freely cross borders with your regulated data and still be compliant and in control of your data?
 
Join us for one hour to hear from three experts on what you need to know to get ready for GDPR and NIST before the deadline, and how you can utilize a data-centric security strategy to quickly overcome challenges to being compliant.
 
In the Webinar you’ll learn: 
 
• Key questions to consider when starting your compliance journey
• How to efficiently address common cross-regulation compliance issues
• How to collaborate and share information outside your company’s borders and still be compliant and secure 
 
Who Should Attend? 
If your role is in information security, data loss protection, governance, risk and compliance, or IT, don’t miss this webcast.

More Info

Sponsored by: Seclore

Vendor Webcast

The Hybrid Cloud Reality: Managing Security in Private, Public & On-Premises Environments

In a recent study, 90% of IT security practitioners reported that their organization has adopted or plans to adopt a cloud solution. Cloud is now.

x

The Hybrid Cloud Reality: Managing Security in Private, Public & On-Premises Environments

In a recent study, 90% of IT security practitioners reported that their organization has adopted or plans to adopt a cloud solution. Cloud is now. And it’s making already complex security infrastructures even more so. In the process of deploying public and private cloud services, businesses are discovering new challenges  in visibility, scalability and control of their cloud and on-premises environments. This impacts their ability to mitigate risk and keep up with business agility and demands.

Managing security in a hybrid environment raises a number of questions:

• How do I get the same level of visibility into cloud security infrastructure as on-premises?

• Who should be responsible for managing cloud security?

• How do I ensure consistent security across/between all of my different cloud environments?

It’s a series of questions FireMon Co-Founder and Chief Product Strategist, Jody Brazil, will answer in this upcoming webinar The Hybrid Reality: Managing Security in Cloud & On-Premises Environments on Thursday, June 29.

More Info

Sponsored by: FireMon

Editorial Webcast

Beyond the endpoint: Protecting a diverse environment

This webcast will look at how CISOs can defend their diverse computing environment against a new generation of attacks through better training, authentication and...

x

Beyond the endpoint: Protecting a diverse environment

Anywhere-anytime access to organizational resources has become a must-have for executives. Through the use of mobile phones, laptops and more, professionals at all levels expect to quickly connect to important data assets and applications stored in the cloud. But, as endpoints become blurred and the perimeter morphs into something new – where data resides in the cloud and on partners’ networks – the ability to protect applications, devices and identities changes as well. This webcast will look at how CISOs can defend their diverse computing environment against a new generation of attacks through better training, authentication and risk management.
More Info

Sponsored by: Duo Security

Vendor Webcast

Respond to threats efficiently with combined threat intelligence and orchestration

Join our webinar and learn how you can respond to incidents, including ransomware, faster and more intelligently by leveraging threat intelligence and dynamic playbooks...

x

Respond to threats efficiently with combined threat intelligence and orchestration

Threat intelligence coupled with an orchestration platform for incident response are a potent combination for efficiently responding to, and staying resilient, against modern cyber attacks. Anomali’s ThreatStream combined with the Resilient Incident Response Platform ensure analysts are not only armed with the right information but can quickly and efficiently make operational use of it. Join our webinar and learn how you can respond to incidents, including ransomware, faster and more intelligently by leveraging threat intelligence and dynamic playbooks.
More Info

Sponsored by: Anomali

Vendor Webcast

Orchestrate Your Security Defenses with Threat Intelligence

How the IBM Security Operations and Response architecture can help you identify and response to threats faster

x

Orchestrate Your Security Defenses with Threat Intelligence

Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it’s difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to identify and respond to threats, many companies don’t take full advantage of the benefits of external context that threat intelligence brings to identify true indicators of compromise. By taking advantage of both machine- and human-generated indicators within a collaborative threat intelligence platform, security analysts can streamline investigations and speed the time to action.

Join this webinar to hear the Chief Technology Officer perspective on:
• How the IBM Security Operations and Response architecture can help you identify and response to threats faster
• Why threat intelligence is a fundamental component of security investigations
• How to seamlessly integrate threat intelligence into existing security solutions for immediate action
More Info

Sponsored by: IBM

20/20 Webcast

The Moat is Empty; How is the Castle Protected?

This 20/20 webcast looks at this application and data-focused approach – its benefits and challenges.

x

The Moat is Empty; How is the Castle Protected?


Historically, corporate data security focused on network-centric devices. One would protect the network at the perimeter, then build layers of defenses much like an onion or parfait has layers. Encryption and identity and access management (IAM) were added, but often as point products. This focus on the network is still common in many companies much in the same way that in the medical profession, specialists are used more often than general practitioners. A more holistic approach that focuses on data and applications rather than devices is finding its share of followers. Today’s 20/20 webcast looks at this application and data-focused approach – its benefits and challenges.

More Info

Sponsored by: Citrix

Vendor Webcast

Ransomware Hostage Rescue Guide

In this webinar, we will look at scary features of new ransomware strains.

x

Ransomware Hostage Rescue Guide

It’s a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and with the latest new ransomware worm WanaCry affecting hundreds of thousands of machines, there is no end in sight for 2017.
In this webinar, we will look at scary features of new ransomware strains, give actionable info that you need today to prevent infections (and future variants), and what to do when you are hit with ransomware.

Erich will cover these topics:
• Latest scary ransomware strains, including WanaCry and its variants
• I’m infected, now what?
• Proven methods of protecting your organization  
• How to create a “human firewall”



 

More Info

Sponsored by: KnowBe4

20/20 Webcast

Cloud Access Security Broker (CASB)

This 20/20 webcast will look at how these brokers are implemented, what they can and cannot do, and why you should consider them for your cloud-based applications...

x

Cloud Access Security Broker (CASB)

Defense in depth has become a mantra for enterprise-managed data centers, but how do you add such defenses in a cloud environment where you don’t have physical access to the servers? Enter the cloud access security broker, an enforcement point between the cloud and the data center where the CISO can introduce layered security into cloud-based data. This 20/20 webcast will look at how these brokers are implemented, what they can and cannot do, and why you should consider them for your cloud-based applications and data storage.
More Info

Sponsored by: Forcepoint