Webinar Archives
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Date: 10/29/2019
Sponsors:
SPECOPS
View archived webinar

Weak and compromised passwords are the leading cause for many data breaches. NCSC and NIST have put out password best practices that recommend moving away from enforcing character composition and password expiry, while emphasizing the use of password blacklists. In this webinar, you will learn:

  • Common bad password habits
  • Password best practices
  • How a full-featured password filtering solution can help

Innovative Application Security For Today’s Hyper-Connected Enterprises
Date: 10/3/2019
Sponsors:
Cequence
View archived webinar

Today’s hyper-connected organizations rely on web, mobile and API-based applications to connect with customers, partners and suppliers across their digital ecosystem. But these applications are also priority targets for two types of cyber attacks that usually result in stolen IP, financial fraud and business disruption. Security teams need to be able to stay one step ahead of these bad actors and stop them in their tracks. Advances in security automation and intelligence now make that possible.

Key topics include:

  • Introduction to the two types of application attacks
  • Insight into how these attacks are constructed and executed
  • Examples of attack objectives and impact on businesses
  • Research from 800+ customers that have been affected by the attacks
  • Introduction to Cequence Security’s patented AI-powered security platform

IT Security Is Broken – Can Zero Trust Access Fix It?
Date: 8/6/2019
Sponsors:
Portsys
View archived webinar

Fixing a broken IT security infrastructure is no longer just a backroom problem – it’s now a top boardroom priority. As the breaches at Equifax and the American Medical Collection Agency show, holes in your attack surface can cripple your company’s bottom line.

In this webinar, we will focus on what’s wrong with IT security infrastructure today and how to quickly implement a Zero Trust Access across the modern hybrid enterprise to fix it.

Key Takeaways:

  • Critical flaws in security infrastructure
  • How organizations play right into hackers’ hands
  • Six key questions to ask about your security profile
  • Three approaches to Zero Trust: identity, data and access
  • How Zero Trust Access enables digital transformation

Making an Intelligence-led Defense a Reality
Date: 6/26/2019
Sponsors:
ThreatConnect
View archived webinar

Intelligence-led defense is not exactly a new term, but few security teams have fully embraced it, despite its proven advantages. Why? The idea of getting started can be daunting. And getting the team behind the necessary changes is hard. In this webinar, we’ll explore the challenges of implementation, some tools to overcome them, and the best way to sell the concept throughout the organization.

You’ll learn how to:

  • Overcome common misconceptions of intelligence and demonstrate intelligence to your peers as a process, not just a thing you buy.
  • Start with the end in mind, with a staged holistic approach to implementing an intelligence-led defense.
  • Establish intelligence as a measurable service to the rest of the internal security team and executive staff with defined requirements, deliverables, and feedback that drive collection analysis and process.

We’ll also talk about technology and services that can help you on this journey.

Considerations in Selecting the Right SD-WAN Solution - The role of service providers and future planning
Date: 6/20/2019
Sponsors:
Versa
View archived webinar

Enterprises are being challenged by new business demands to build agile network platforms that can support digital operations and processes. The challenge for IT teams is to develop this flexible network and IT infrastructure to support a shift to cloud-centric applications while also reducing operational cost.

Enterprise IT departments need to ensure secure application delivery anywhere, with a high level of performance for critical business applications. The expectation is to provide continuous, high-quality, secure connectivity that extends out to remote sites, to mobile users, and to business partners that access applications hosted in a multicloud environment of private data centers and public software-as-a-service (SaaS).

Software-defined wide-area networking (SD-WAN) and virtualized network functions (VNFs) hosted on commercial off-the-shelf hardware are changing the economics and the architecture of the wide-area network (WAN). These new platforms make the network more dynamic and support enterprises in managing their operations with policy-driven application security, application visibility, application-aware routing, and application performance guarantees.

In this webinar, Ovum's Rik Turner discusses considerations for enterprises choosing a SD-WAN solution, in particular when considering outsourcing SD-WAN management to a service provider, and how to future-proof those decisions.

Levers of Human Deception: The Science and Methodology Behind Social Engineering
Date: 6/18/2019
Sponsors:
KnowBe4
View archived webinar

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

Join Erich Kron, Security Awareness Advocate for KnowBe4, provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating our users.

Key Takeaways:

  • The Perception Vs. Reality Dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
  • How we can defend ourselves and our organizations

Risk Buy-Down: Why Data Security is a Must
Date: 4/23/2019
View archived webinar

With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well-established, securing data itself must be front and center of enterprise strategy. As threat actors continue to find ways through the corporate edge and to hijack the accounts of legitimate users, protecting sensitive data and ensuring that authorized data activity is appropriate are the cornerstones of mitigating risk.

Join this webinar on April 23rd at 11am ET and learn:

  • What is the most effective way to mitigate data breach risks
  • Why does security have to be data-centric
  • What are the shortcomings of perimeter-based security and IAM tools
  • How to enhance perimeter security, IAM, DLP, SIEM with modern database security

Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Date: 4/9/2019
Sponsors:
OPaQ
View archived webinar

Companies of all sizes are modernizing their networks to meet today’s business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies – and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:

  • Understand what top security vulnerabilities are plaguing companies as they modernize their networks
  • Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
  • See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security

Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with