Risk Management Multimedia
-
A Risk-Adaptive Approach to Dynamic Data Protection
Sponsored by: ForcepointData protection can halt a security organization and productive work. Today, security teams are bogged down with alerts – but they don't have to be. Tune into this webinar to see how this data protection system uses human-centric behavior analytics to continuously determine the risk users pose, based on their actions.
-
GDPR is Live, Now What
Sponsored by: IBMThe GDPR deadline of May 25th 2018 has passed so what can we expect to see now? In this webcast, experts John Bowman, Virginia Chinda and Jessica Douglas discuss how organizations can use GDPR as an opportunity to accelerate their analytics journey. They also discuss important GDPR topics and what to expect in the future.
-
2019: No Oscars for Bad Threat Actors
Sponsored by: DomainToolsThere has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.
-
The Beginner's Guide to Mitigating Phishing Attacks
Sponsored by: DomainToolsPhishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.
-
CEO Insights - Cybersecurity Predictions for 2019
Sponsored by: Arctic WolfCybercriminals have hacked into many name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down. In this webcast, Brian NeSmith walks through cybersecurity predictions and what organizations can do to best prepare for them.
-
Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem
Sponsored by: CyberGRXDownload this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.
-
Solving the Cybersecurity Skills Shortage
Sponsored by: Arctic Wolf22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.
-
Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
Sponsored by: Arctic WolfIn a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
-
Integrated Security Operations - The Difference between Knowing and Guessing
Sponsored by: ServiceNowCyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.
-
Why Websites Stay Vulnerable: And What You Can Do About It
Sponsored by: WhiteHat SecurityWeb application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
-
Getting the Most out of your AppSec Program
Sponsored by: WhiteHat SecurityAccording to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
-
Orchestration of App-Driven Security Policies
Sponsored by: Silver PeakTake a look at this webcast to discover how to orchestrate security policies within applications.
-
Strengthen Your Ransomware Strategy
Sponsored by: AdvizeX TechnologiesEveryone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
-
Get Real Time Threat Detection Starting on Day 1 with AlienVault USM
Sponsored by: AlienVaultSave time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
-
Manage Your Operational Big Data Like a Super Hero
Sponsored by: IBMLearn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Webcast: Symantec Internet Security Threat Report 2014
Sponsored by: Symantec CorporationDownload and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.