Webinars

 

Webinar | Social Engineering Strategist Showdown

Building Human Intrusion Detection Real Stories from the Field The leading cause of data breaches is people. Employees are a company’s most valuable asset and unfortunately they are usually the weakest point in a security strategy.Worse, in most cases the effectiveness of social engineering attacks now exceeds 90%. Defense against social engineering attacks is challenging because […]
Posted in Webinars

Webinar | Top Challenges in Firewall Management

Simplifying Firewalls- People, Processes, & Technologies Aligned Central to risk management are people, processes, and technology. Security teams make continuous changes within those areas to protect their data but it’s those same changes that expose their organization to data breaches and service outages. In fact 80% of services outages are caused by changes to the […]
Posted in Resources, Webinars

Webinar | Building a Legal Defense for your Data

Jeff Goreski, CAMS, CFCS, CEDS, PMP, ITIL, VP of Forensic & Dispute | CBI, will be discussing how to start building data foundation to meet legal compliance regulations. As a certified eDiscovery specialist, Jeff has consulted, advised and stood as an expert in the collection of technological data for clients globally. Forensic gathering as well […]
Posted in Resources, Webinars

Webinar | Secure Development Lifecycle

CBI Security Strategist, J. Wolfgang Goerlich discusses how to start using a Secure Development Lifecycle and the application security landscape.  
Posted in Resources, Webinars

Webinar | Closing the Endpoint Security Gaps

Our thirty minute on-demand webcast is an excellent resource to get an update on current endpoint trends. We cover the business impact of complex endpoint environments and their inherent security risks. Learn how organizations are using unified platforms to find, fix, and secure endpoints. Topics Covered: Current state of endpoint environments New types of endpoints […]
Posted in Resources, Webinars
Need to evaluate the security posture of your existing #encryption program? https://t.co/nzTtY8HS5X #assessment https://t.co/gvVMBJ8aVm
Thank you @FireEye, a fantastic #FEYEMomentum 2016 #SeeYouNextYear #sponsor https://t.co/IGckQ0mBkC
The geography of a hack: Where are your cyber villains located? https://t.co/ZslX0oHTkT by @TheStreet #infosec https://t.co/3CS6MwUfHg
Industrial Hacking - How Cybercrime Went Pro @CBI_IT @baronesteve via @TheStreet https://t.co/GpeW9Mdcwy #InfoSec https://t.co/SBvTLdCaa6
Get caught up on the #encodedecode #podcast with @jwgoerlich https://t.co/q01LxM5lEm #infosec https://t.co/Bcx8rlTbpu
Incorporating data analytics into your #InfoSec program https://t.co/l0MDRk0F2y @jbeeskow @TheCIOReview https://t.co/ie5MHNcLFm
Still time to join us for our #webinar today at 2pm ET with @jwgoerlich & @Gemalto https://t.co/khVJ8lvQt3 #infosec https://t.co/aXktggdIpP
Listen to the next episode of #encodedecode #podcast with @jwgoerlich https://t.co/8QPS8tg7ps #infosec https://t.co/Kdgapb1Kdo
Still time to register for our upcoming #Healthcare #Infosec Forum in Houston on Feb 2nd https://t.co/ckU7h7Oimp https://t.co/bGM5feSVl7
BLOG: Fixing the IT Security Talent Gap - CBI Academy https://t.co/UJjqhn2RS0 #infosec #cbiacademy #ITtraining https://t.co/WsmAJzVBfR
READING: Happiness is having expanded to downtown Detroit https://t.co/AaiJEF6zjL by @crainsdetroit #infosec https://t.co/ydpjN8MwnS
Upcoming #webinar 01/28: Unlocking Data #Encryption with @jwgoerlich & @Gemalto https://t.co/q1yYfbUt1h #infosec https://t.co/57p3FaGmXY
You’re Not a Criminal, But You’re Going to Prison https://t.co/JUzYb6sd07 #infosec #socialEng https://t.co/eV24ejPrON
Building Better #HIPAA Security with Penetration Testing https://t.co/tPqSrR4Xpd by @mpearsonCISSP #infosec #pentest https://t.co/PTFSjB6FyK
The Top ‘Worst’ #Password of 2015 is ‘123456’ Again https://t.co/3nX6jsdt7w by @InfosecurityMag #infosec https://t.co/sdOgep1dCu
That Time We Wound Up Interviewed by the FBI https://t.co/9fXUsKfxnF by @PattiEng#infosec #client https://t.co/Lu2sut1SbB
#BSidesCMH Stop by, say hi to the team, enter for a Raspberry Pi 2 & pick up your Happy Hour wristband for tonight! https://t.co/AHaPTVWSLb