Author: Team CBI

 

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Partners: Symantec’s Blue Coat Acquisition Lays Foundation For More Stable, Forward-Looking Security Vendor | CRN.com

Steve Barone, president and CEO of Ferndale, Mich.-based CBI, said that combination of capabilities will “add value” to the Symantec portfolio for partners that have already invested in the portfolio. “This is going to be a brilliant merger of technologies,” Barone said. … While Symantec leadership had been talking seriously about making acquisitions since its […]
Posted on
Posted in News, Press

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars
The train station opens for the 1st time in 40 years for @dethomecoming! Here's our CEO Steve Barone on WHY DETROIT https://t.co/1vsTfFx3U5
"Is there a harder working city in the world than Detroit? Well, I don't know about that." - CEO Steve Barone https://t.co/QdjT3NYdsY
WHY DETROIT? Our CEO Steve Barone has many reasons @dethomecoming @crainsdetroit https://t.co/OhQ8ThAKmd
The train station opens for the 1st time in 40 years for @dethomecoming! Here's our CEO Steve Barone on WHY DETROIT https://t.co/FWuPMpvf4d
Are you compliant and ready for anything within your environment? Join us on 9/12 in Detroit so you can #BeReadyhttps://t.co/7yjSI8ADw5
Are you compliant and ready for anything within your environment? Join us on 9/12 in Detroit so you can #BeReadyhttps://t.co/TKewHtXfPt
Be Ready: IT Compliance Briefing Detroit - This is a great opportunity to prepare your organization. #InfoSechttps://t.co/dVJbVtnzMg
Are you compliant and ready for anything within your environment? Join us on 9/12 in Detroit so you can #BeReadyhttps://t.co/yv8oQv3SBv
Be Ready: IT Compliance Briefing Detroit - This is a great opportunity to prepare your organization. #InfoSechttps://t.co/S9eokrgUFy
CBI BLOG: eDiscovery services can help uncover fraud at any level within an organization. Read more:… https://t.co/OMFYnTiMjd
CBI BLOG: Keeping your email secure should be near the top of your priority list. Read more:… https://t.co/ngD3MtCd2E
Come learn the ins and outs of SEP 14 at our upcoming workshops #InfoSec #SEP https://t.co/qUkftdPiWp https://t.co/rn3RYMBeDp
CBI BLOG: eDiscovery services can help uncover fraud at any level within an organization. Read more:… https://t.co/4z7k4i0z7m
Come learn the ins and outs of SEP 14 at our upcoming workshops #InfoSec #SEP https://t.co/cVpIqRvW7o https://t.co/kQrQkwZcLu
CBI BLOG: Keeping your email secure should be near the top of your priority list. Read more:… https://t.co/mDS6mEwHYE
CBI BLOG: More than 1 million Americans are stalked online each year. Here's how to avoid being targeted. Read:… https://t.co/mNcdXphGTH
CBI BLOG: Social engineering can be as simple as walking through the door. Read more: https://t.co/H3hYMeXvzY https://t.co/LmYOjk1Fbp
Utilize proxy servers to elevate your security strategy #Webinar #CloudSecurity https://t.co/IYOPRf1Yzd https://t.co/21xh0BTDXT
Utilize proxy servers to elevate your security strategy #Webinar #CloudSecurity https://t.co/G1yYynfHs5 https://t.co/cTjvJEOWsP