Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there were more than 169 million records exposed in 1,400 data breaches. An astonishing 43% of those breaches were caused by people within the breached organizations. The identities in your organization – the employees, contractors, suppliers, […]
Posted on
Posted in Resources, Webinars

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid security posture. Building vulnerability management into your security planning is essential, and provides two main benefits: identifying your weakest areas and attack awareness, giving you the ability to build better defenses and protect against real-time […]
Posted on
Posted in Resources, Webinars

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT security teams. Building a great security posture begins with the fundamentals: people, process, and technology (PPT). These three pieces must be strong and work seamlessly in order to maximize their effectiveness. One weak link can […]
Posted in Webinars

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate out of 1000’s and which side is it coming from. Whether it’s hackers using new methods to gain access or insider threats like a simple mistake of leaving a laptop behind, data defense is becoming […]
Posted in Webinars

Webinar | The InfoSec Game Has Changed – Have Your Defenses

Beat APTs with a Winning Tag Team Advanced Persistent Threats (APTs) use technologies, people, and processes over an extended time to defeat your defenses. If your defenses don’t incorporate those three pieces chances are your data and Intellectual property (IP) are at risk. Don’t Be a Victim, Be a Hero Join CBI and Symantec experts […]
Posted in Webinars
Not every briefing is a Lunch and Learn. Join CBI & @veritastechllc in an exciting setting https://t.co/uHgludoVW8 https://t.co/i14ZQxOtzt
Organizations must take a more strategic approach to IAM @SailPoint #InfoSec https://t.co/YpSlhLdUvT https://t.co/nWt9TkKl9m
500 million Yahoo accounts breached. The FBI believes this was a state-sponsored attack https://t.co/TSvElVKVXT https://t.co/WKDCuLCNWb
Next month join CBI and @veritastechllc for a data protection briefing at @PunchBowlDET https://t.co/aPNWR4GcDo https://t.co/OxLq8j98vi
Learn about @veritastechllc and enjoy drinks and food with us on Oct. 20 in Detroit https://t.co/n67GgN0Hyw https://t.co/6TpA8WwvfY
Data has a mind of its own. @veritastechllc can help sort out its changing personality https://t.co/JMlu4HtW9X https://t.co/Cg9aB7k12E
SecurityCenter adds a whole new level to cloud security @TenableSecurity #InfoSec https://t.co/KQmMp0jCI5 https://t.co/zphFeAvnjG
Check out Jason Cordell's blog about #BigFix @IBMSecurity https://t.co/JPWenOv5I9 https://t.co/Ilj2s4ir6j
New report shows risk of not inspecting encrypted web traffic #InfoSec #encryption https://t.co/hxmS85LIKF https://t.co/RsA59PTkVC
Things IBM BigFix Can Do for Your Endpoint Security https://t.co/VDiB4eZdrU by @IBMSecurity https://t.co/lxgZuDr5Wr
#Ransomware continues to spread, this time hitting cloud applications #InfoSec https://t.co/vJVbzyqwA6 https://t.co/rVPEUlPV99
CBI’s own @jwgoerlich will talk during PMI Michigan’s Professional Development Day on Sept. 26 #InfoSec @pmimtc https://t.co/wchKIug4Mf
#MISEC Lansing is happening now. Headlined by @taco_pirate, CBI's @seastartea & @geoscout_CJ have lightning talks https://t.co/Qq6pTE0jSP
"@jwgoerlich Stuck in Traffic - Organized Crime, Take-aways from #HPEProtect: https://t.co/IjBsPkeLHa  via @YouTube"
The first #MISEC Lansing is tonight. Come check out lightning talks by CBI's @seastartea & @geoscout_CJ https://t.co/ciXlfL3HEn
Attackers posing as insiders cause $4 million in damage per year #InfoSec #InsiderThreats https://t.co/y0bUtmzY8B https://t.co/NX3qn6R8B0
Hackers are using SSL encryption to slide by perimeter defenses #InfoSec #encryption https://t.co/MhIGyElc2Y https://t.co/NwyekM1bXc