Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars

Webinar | The InfoSec Game Has Changed – Have Your Defenses

Beat APTs with a Winning Tag Team Advanced Persistent Threats (APTs) use technologies, people, and processes over an extended time to defeat your defenses. If your defenses don’t incorporate those three pieces chances are your data and Intellectual property (IP) are at risk. Don’t Be a Victim, Be a Hero Join CBI and Symantec experts […]
Posted in Webinars
A perfect opportunity to explore endpoint security solutions #BigFix #IBM @IBMSecurity https://t.co/ijRbEvg53Z https://t.co/w3GmKqaO2L
Google’s new video-calling app, Duo, was designed with an emphasis on security #InfoSec https://t.co/Jjw0gL7lkL https://t.co/OyNPoqsuzC
This instructor lead 2-day program will teach you the ins and outs of #BigFix @IBMSecurity https://t.co/Rie69rMH4p https://t.co/nqpacUKVEB
The ransomware business model makes a cruel device even more destructive #InfoSec https://t.co/D6WM3sUcxg https://t.co/vOxQTodJc4
Thank you @symantec for being a Platinum Sponsor! #saleconference #partner https://t.co/FvofcCyMLM
Ransomware, data breaches, & password leaks are everywhere in 2016 #Infosec #Ransomware https://t.co/Sh1itmSnKl https://t.co/d7CukbPIcq
Proactive threat hunting should be standard for your company #Infosec #MiSec https://t.co/3kntDc7gTH https://t.co/fyLXysGvAx
Learn the most effective steps to prevent attacks on Sept. 12-17 @SANSInstitute #misec https://t.co/wRV8tV6oej https://t.co/rL44ldr50g
The Rio Olympics show an increase in cyber risk to tourists #Infosec #Rio2016 https://t.co/XdMBKbdOtd https://t.co/Gcm17O8w2K
Black Hat USA had some interesting things to say about ATM Hacking #Infosec https://t.co/HofIybf2AT https://t.co/6sjui9ixjC
Join now! Our Managed Symantec EndPoint Protection Workshop starts at 2pm ET! https://t.co/E0HMfnNgHs #infosec https://t.co/PN5NU6n5sR
Don't miss out! Still time to register for today's MSEP Workshop w/ @mpearsonCISSP https://t.co/Tf3u5nd6IZ #infosec https://t.co/ZU0bFBn6g1
Starting with Security Essentials, SANS training will happen in Detroit this fall #misec https://t.co/DzUljEmWjR https://t.co/qZXS2FJqTB
Learn new endpoint best practices on Aug. 11 at 2 PM EDT. #MSEP #Webinar https://t.co/Bw9y2y5pJB https://t.co/J0nmnhTsG0
More than 390k Disney Playdom forum users affected in the #breach #infosec https://t.co/S6DxzBNnEN https://t.co/wbDtoS62xn
MSEP 101 – A workshop you shouldn't miss. Aug. 11 at 2 PM EDT. #Webinar https://t.co/h4aeFtzBxs https://t.co/hNKgH35SGL
Even Social Security now uses two-factor authentication #Infosec #2FA https://t.co/Efe7SLldrt https://t.co/lXnkuWpSme
Blog: There is no universal standard to assess a vendor’s security posture #Infosec https://t.co/OvToV9rPSA https://t.co/rocZhkVDfu
MSEP 101 – A workshop you shouldn't miss. Aug. 11 at 2 PM EDT. #Webinar https://t.co/zqbDQu1W2w https://t.co/rAl7oq2oiy
Organizations struggle to find qualified security experts they need. #MSEP can help https://t.co/xncVi89XcU https://t.co/vslpLh4p3T