Webinars

 

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars

Webinar | The InfoSec Game Has Changed – Have Your Defenses

Beat APTs with a Winning Tag Team Advanced Persistent Threats (APTs) use technologies, people, and processes over an extended time to defeat your defenses. If your defenses don’t incorporate those three pieces chances are your data and Intellectual property (IP) are at risk. Don’t Be a Victim, Be a Hero Join CBI and Symantec experts […]
Posted in Webinars
With the latest intelligence from @symantec, the number of web, phishing, and spam attacks all increased #InfoSechttps://t.co/q0nrTL06d2
“Ransomware is a business, and as a business, it’s going to evolve.” Check out what to watch for in 2017…… https://t.co/RzQ3E6zvKl
Detroit & Ann Arbor Area: Join @CBI_IT and @symantec during 2017 at one of our several technical workshops #SEP14https://t.co/Bj8gHExhNE
People like to try before buying. @IBMBigFix Proof of Technology workshops allow you to experience #BigFix hands-on… https://t.co/Ez1cBbfeCq
People like to try before buying. @IBMBigFix Proof of Technology workshops allow you to experience #BigFix hands-on… https://t.co/M7nVp7pkoP
People like to try before buying. @IBMBigFix Proof of Technology workshops allow you to experience #BigFix hands-on… https://t.co/AxFQ6n4VAE
If you're at @codemash tomorrow check out @jwgoerlich's talk on data-centric encryption and how to stop cyber crimi… https://t.co/i4II2q2l0U
According to @IBMSecurity, collaborating companywide helps create awareness that prevents attacks #InfoSechttps://t.co/ozwXKcSvTE
Detroit & Ann Arbor Area: Join @CBI_IT and @symantec during 2017 at one of our several technical workshops #SEP14https://t.co/Bv1Qd0Bk4O
While ransomware settles in, #InfoSec professionals begin to create game plans to foil these threats @IBMSecurityhttps://t.co/mVBFbmw47S
Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead #infoSec https://t.co/B3ob5gJ9tf https://t.co/3Ru20kf0Cp
Detroit & Ann Arbor Area: Join @CBI_IT and @symantec during 2017 at one of our several technical workshops #SEP14https://t.co/HOp7a5ri3a
Understand @IBMBigFix best practices at the next @CBI_IT hosted IBM Proof of Technology event near you #InfoSechttps://t.co/OYY8o0YPZo
Watch now! Our @symantec #SEP14 webinar is available, catch up on what’s happening in the endpoint space #InfoSechttps://t.co/8oYVGtzcN0
The capabilities of #SEP14 are best displayed when testing the technology first hand #MiSec https://t.co/5oJSV87O1J https://t.co/S9rc4TaTcf
Understand @IBMBigFix best practices at the next @CBI_IT hosted IBM Proof of Technology event near you #InfoSechttps://t.co/w0GY2VGV2J