Managed SEP

Managed SEP

Learn More
IT Maturity

IT Maturity | An Assessment Led Approach

Learn More
A Better Approach to DLP

A Better Approach to DLP

Learn More

07 July

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there…

View more
13 June

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid…

View more
29 April

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT…

View more
22 April

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate…

View more


EncodeDecode

Hacker defense against the dark arts

 

EncodeDecode

 


17 March

Responding to Sophisticated Social Engineering & InfoSec Attacks

Industry: Manufacturing Solutions: Social Engineering Patti Engineering, a CSIA Certified control systems integration company offering high-caliber engineering and software development…

View more
18 July

eDiscovery Managed Services

Industry: Utility Solutions: Symantec Clearwell (eDiscovery) Utility companies deal with a vast amount of regulatory oversight and mounds of associated…

View more
12 August

Enhancing Security Through Custom Symantec Solutions Suite

Industry: Healthcare Solutions: Symantec™ Control Compliance Suite Symantec Data Loss Prevention Symantec Mobile Device Management As a health services provider,…

View more
14 September

Protecting IP with SEP

Industry: Manufacturing Solution: Symantec™ Endpoint Protection Prior to contacting CBI, the client had reached a stalemate with its previous network…

View more
Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/24IZGnkroo https://t.co/y0JscoHQZu
Always be on the lookout for Social Media spoofing #CBIBlog https://t.co/Kbok13axkk https://t.co/R1FcepSgpl
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/pT1Slvr12N by @CBI_IT
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/J4RpjKAX8P by @CBI_IT
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/Cx3fTyYps0 https://t.co/qp6db088RP
Social engineers come up with new tricks all the time, be prepared #CBIBlog https://t.co/ieYlvl2ZC5 https://t.co/w4CdZddlFM
Improve Your Cyber Hygiene With These 5 Social Media Dos and Don’ts #CBIBlog https://t.co/zhFaFSJC5P https://t.co/sRL6Tf2gIY
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/VxiSNYxJ8V https://t.co/R33fgqvRe1
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/mcqyXhTuvP https://t.co/YbH65TlD2L
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/saGkBkqSkS https://t.co/eG6jY2Enlv
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/ZFBXs4H6gM https://t.co/BUOiBaQRPd
5 Cybersecurity Terms Everyone Should Know | CBI https://t.co/1uX5ixVXxF by @CBI_IT
7 Simple Ways to Safeguard Your Social Media Accounts From Social Engineers #CBIBlog https://t.co/bP3QHjUdlz https://t.co/rTmIYpXk4s
Hackers can attempt to spoof you through IP, email, calls or other methods #CBIBlog https://t.co/x7kzfK9414 https://t.co/YpnVrNIQWN
Customizing your SIEM structure can really weigh your team down #CyberSecurity #SIEM https://t.co/feJAebkqPl https://t.co/WVO7iUSUrS
Join us in Charlotte, New York, Las Vegas, Tampa. #IBMBigFix #Security https://t.co/Tt4uQ66nVc https://t.co/jfrKgErROf
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/sE9QmaKSds
4 Ways to Easily Identify Spoofing in Seconds #CBIBlog https://t.co/I7q3xVrwpD https://t.co/Fm3ethdDkx
Here is three types of cyberattacks you may not have heard of #CyberCrime https://t.co/9BUqoWjY3o
CBI's strategic program practice can build encryption in to a security plan specific to your company #CBIBloghttps://t.co/qnfauA26bz