Author: Team CBI

 

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Partners: Symantec’s Blue Coat Acquisition Lays Foundation For More Stable, Forward-Looking Security Vendor | CRN.com

Steve Barone, president and CEO of Ferndale, Mich.-based CBI, said that combination of capabilities will “add value” to the Symantec portfolio for partners that have already invested in the portfolio. “This is going to be a brilliant merger of technologies,” Barone said. … While Symantec leadership had been talking seriously about making acquisitions since its […]
Posted on
Posted in News, Press

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars
Do you know enough about eDiscovery? Having an eDiscovery system in place is necessary in case of litigation… https://t.co/WppjS74uzH
Do you know enough about eDiscovery? Having an eDiscovery system in place is necessary in case of litigation… https://t.co/ftag3OBnL5
We're at the Great Lakes #Infragard Conference all day in Detroit. If you're here, come talk security with us! #MiSec #Infrastructure
To prevent accidental internal attacks, educate your employees about cybersecurity and what to watch for #InfoSechttps://t.co/ywCLLOiWSq
Do you know enough about eDiscovery? Having an eDiscovery system in place is necessary in case of litigation… https://t.co/PN9O7zEDXT
Knowing how cyber criminals launder money within an organization can help you spot the threat #InfoSechttps://t.co/ztDyyU9bCa
To prevent accidental internal attacks, educate your employees about cybersecurity and what to watch for #InfoSechttps://t.co/n2a1yiqvCE
Do you know enough about eDiscovery? Having an eDiscovery system in place is necessary in case of litigation… https://t.co/XZvXsSakvO
How in-depth has your business gone with identity management? #InfoSec #CBIBlog https://t.co/LKUEfe5Wmf https://t.co/Iog0IZgZNH
Knowing how cyber criminals launder money within an organization can help you spot the threat #InfoSechttps://t.co/psbvlRZBLq
After the #WannaCry attacks, read our #CBIBlog on why a security event recovery plan is crucial… https://t.co/unA0avm4zv
How in-depth has your business gone with identity management? #InfoSec #CBIBlog https://t.co/p8IQ6jooDz https://t.co/mVgXDp1FWi
An incident response program can save you thousands, if not millions in the case of a cyber breach #InfoSechttps://t.co/zwiYbDnElW
The number of data breaches continues to rise. How can a penetration test show you where your network is vulnerable… https://t.co/lvp09rjRMl
An effective identity management strategy should offer direct integration #InfoSec #CBIBlog https://t.co/EWpAxbgCSR https://t.co/YeMkpNllLe
After last week's #WannaCry attacks, read our #CBIBlog on why a security event recovery plan is crucial… https://t.co/UhJQC8HMzq
The number of data breaches continues to rise. How can a penetration test show you where your network is vulnerable… https://t.co/ZmIV0ksT8z
An incident response program can save you thousands, if not millions in the case of a cyber breach #InfoSechttps://t.co/hSyduDd47K
To prevent accidental internal attacks, educate your employees about cybersecurity and what to watch for #InfoSechttps://t.co/uSAXMe2p81
After last week's #WannaCry attacks, read our #CBIBlog on why a security event recovery plan is crucial… https://t.co/qkhGjQQMu3