Webinars

 

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars

Webinar | The InfoSec Game Has Changed – Have Your Defenses

Beat APTs with a Winning Tag Team Advanced Persistent Threats (APTs) use technologies, people, and processes over an extended time to defeat your defenses. If your defenses don’t incorporate those three pieces chances are your data and Intellectual property (IP) are at risk. Don’t Be a Victim, Be a Hero Join CBI and Symantec experts […]
Posted in Webinars
Malware found pre-installed on some Android devices https://t.co/uXZlORJiWk https://t.co/rNITSLIVX5
Companies have increasing confidence in the cloud and its security capabilities #InfoSec #CloudSecurityhttps://t.co/hg14AWsIDb
Malware, adware, hidden apps & other risks make more than 20 million mobile devices susceptible for attacks… https://t.co/kEmikW1i3t
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/421bePLUf7 https://t.co/yB59wTELZo
Why small-business owners are easy prey for hackers #InfoSec https://t.co/70i2Zl7MDi https://t.co/1RgbSdRL1X
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/zsUACHzdLq
When #Ransomware hits, should a company pay up? https://t.co/XrsBj5G12H https://t.co/DaXCsNoSnA
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/BTM4lHy6i1 https://t.co/yUIHUsidDp
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/GDzYmDjdhc
Why small-business owners are easy prey for hackers #InfoSec https://t.co/HgxAcbSk0Q https://t.co/Jxtstjkcqp
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/J9JN4XGgGZ
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/ClUE788hbx
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/25KYcHYwy6
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/SdFVuLD849
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/uZjPFeF3hC
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/GGXfafItLR
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/jRBAP3dM5I
#ShadowIT continues to haunt the threat landscape in Cloud security #InfoSec https://t.co/v0VPU98G9L https://t.co/l74YUhZLgY
What are the top three threats CISOs can't yet handle? https://t.co/nPsqH4fqzc https://t.co/atM6whVMeu
Rogue apps plague IT teams. Knowing how many applications are really on your network is crucial #InfoSechttps://t.co/aNFRXz9bHu