ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cybersecurity Multimedia

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • RPA Security Best Practices

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.

  • Cyber Hygiene: Doing the Basics with Microsoft

    Sponsored by: Snow Software

    Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.

  • Defense in Depth: Key Learnings for Achieving Detector and Response

    Sponsored by: Verizon

    Join Gene Stevens and Dave Gold, executive leaders from ProtectWise who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities (video)

    Sponsored by: Fidelis

    In this video, Matt Bromiley, SANS Analyst and Incident Responder, and Gerald Mancini, Senior Vice President of Engineering at Fidelis, discuss elevating enterprise security with Fidelis Cybersecurity in the endpoint security platform. Watch to learn more.

  • ML-Driven Security Analytics and Automated Threat Response for IoT Part 1

    Sponsored by: Extreme Networks

    Adopting specific machine learning capabilities can help you identify & respond to threats inside your network before it’s too late. That’s where machine learning & AI can assist you with automated anomaly & threat detection analytics. Learn how this industry-unique approach can help protect your network today.

  • Improving Cybersecurity with ITAM: An Equifax Case Study

    Sponsored by: Snow Software

    Leveraging IT Asset Management (ITAM) can help protect your organization from the repercussions of data breaches. And with data breaches becoming an increasing occurrence, organizations must re-evaluate their current security environment. In this webinar, learn how ITAM can augment your cybersecurity strategy today.

  • Webinar: Financial Crime

    Sponsored by: SAP Concur

    On Wednesday, 13 November 2019, 11:00am AEDT, join SAP Concur for a 40-minute live webinar on Fraud, Risk & Compliance and why prevention and early detection is your strongest weapon against increasingly sophisticated financial crime.

  • Enhancing IoT Visibility and Security

    Sponsored by: Extreme Networks

    Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • What Really Happened with the Capital One Attack and How to Prevent it

    Sponsored by: Aporeto

    The Capital One data breach on July 30, 2019 was due to the exploitation of a well-known class of security vulnerabilities that are based on security relying on credentials. In this video, listen as Aporeto CTO, Dimitri Stiliadis discusses the root cause and how to prevent a breach with Aporeto.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • Web App Firewall Webinar

    Sponsored by: Tala Security

    In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.

  • Introduction to Claroty

    Sponsored by: Claroty

    In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.

  • Why Should I Care About SSL/TLS Decryption?

    Sponsored by: Gigamon

    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.

  • Automated Threat Detection, Threat Hunting, and Response Platform

    Sponsored by: Fidelis

    In this on-demand demo, see how Fidelis Elevate can help your organization shift from a prevention-focused approach to one that prioritizes detection and response.

  • Fidelis Deception Demo

    Sponsored by: Fidelis

    Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.

  • Webinar: Pages from the Playbook – Building the MITRE ATT&CK™ Framework into your Incident Response

    Sponsored by: IBM

    In this session, Craig Roberts, Solutions Architect at IBM Security, will explain Resilient's approach to ATT&CK and demonstrate how it can be used to investigate and remediate a security incident in coordination with QRadar, the Hybrid Analysis sandbox from CrowdStrike and the MISP threat intelligence platform.

  • Red Cloak Threat Detection & Responses

    Sponsored by: Dell SecureWorks

    Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Natural Language Understanding (NLU): A New Way to Fight Cyberattacks

    Sponsored by: Armorblox

    In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.

  • Sophisticated Cyber Attacks and Trends in Online Fraud

    Sponsored by: Shape Security

    In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.