Webinar | Building a Legal Defense for your Data

Jeff Goreski, CAMS, CFCS, CEDS, PMP, ITIL, VP of Forensic & Dispute | CBI, will be discussing how to start building data foundation to meet legal compliance regulations. As a certified eDiscovery specialist, Jeff has consulted, advised and stood as an expert in the collection of technological data for clients globally. Forensic gathering as well […]
Posted in Resources, Webinars

Webinar | Secure Development Lifecycle

CBI Security Strategist, J. Wolfgang Goerlich discusses how to start using a Secure Development Lifecycle and the application security landscape.  
Posted in Resources, Webinars

Webinar | Closing the Endpoint Security Gaps

Our thirty minute on-demand webcast is an excellent resource to get an update on current endpoint trends. We cover the business impact of complex endpoint environments and their inherent security risks. Learn how organizations are using unified platforms to find, fix, and secure endpoints. Topics Covered: Current state of endpoint environments New types of endpoints […]
Posted in Resources, Webinars
Webinar | IT Maturity

Webinar | IT Maturity

Learn about IT Maturity, why it matters to organizations, who is responsible, and how does it make a business operate better, with CBI’s Security Strategist, J.Wolfgang Goerlich.  
Posted in Resources, Webinars

Webinar | A Better Approach to DLP

Learn how you can utilize DLP 2.0 to empower business units to manage their data risk, define your data handling before trying to block activity, and reduce risk before you classify the data with CBI’s EVP | IT & Security Strategy, John Beeskow.  
Posted in Resources, Webinars
Video: Learn how a CISO, manufacturing co. protects against data loss https://t.co/3UUCibRpKQ #DLP #CISOsessions https://t.co/Q46Apk5YS1
US Retailers on High Alert After ModPos #Malware Warning https://t.co/vp8Sm18HvC by @InfosecurityMag #infosec https://t.co/IOd7ygJeL5
Culture Sets the Tone for Security https://t.co/xdhtrrj8aw #infosec #blog https://t.co/tFAYTP004F
Don't miss @jwgoerlich & Shaun Bertrand in Social Engineering Strategist Showdown https://t.co/O0al8cURwa #infosec https://t.co/kK91zU1US4
Interested in a Social Engineering Strategist Showdown? Join us 12/17 https://t.co/ZIlL4lOOVp #infosec #webinar https://t.co/k4UPFa2XQN
CenturyLinkVoice: 5 Dangerous Cyber Threats To Prepare For In 2016 https://t.co/Y20TOUi0cO #infosec https://t.co/klFYzlaeRN
Interested in jumpstarting your #infosec career? Apply now for our next #CBIAcademy team https://t.co/4AJRNFyzux https://t.co/5bOE1491oq
Are you going through a merger or acquisition? Get tips from a CISO. New series https://t.co/ysad1PxdOD #InfoSec https://t.co/SYQXnmV46p
Need to learn more about Firewall Management? Join us & @FireMon on 12/03 https://t.co/oOZCcE0euM #infosec #webinar https://t.co/XNJwRrIHLX
Reducing Security Risk Using #DLP Technology, feature by @jbeeskow @hfmaorg https://t.co/FPi9BnARGH #infosec https://t.co/M3QNC7x1dv
Join us & @FireMon on 12/03: Top Challenges in Firewall Mngmt, earn CPE credit https://t.co/kflSOSNauE #infosec https://t.co/3VYhrvDDM7
Watch: Tips on how to manage 3rd party & vendor risk from a CISO https://t.co/n5OTIuuksy #CISOsessions #InfoSec https://t.co/n8fC8nxWvk