Shifting Pam Into High Gear with Zero Standing Privilege
sponsored by Remediant
WEBCAST:
Since zero standing privilege was introduced in 2019, it’s considered as a strong addition to privileged access management (PAM). As it happens, admin credentials change over time, and older PAM approaches may not be enough to handle today’s modern threats. Watch this webcast to examine how zero standing access can have a positive effect.
Posted: 28 Aug 2020 | Premiered: May 21, 2020
|
|
|
API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST:
Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020
|
|
|
Ask a CISO Ep. 04: Hard Truths in Cloud Security
sponsored by Horangi
PODCAST:
In this episode of the Ask a CISO podcast, Horangi Director of Cloud Security Engineering Steve Teo joins Horangi Deputy Director of Cyber Operations Mark Fuentes to delve into the nature of cloud data breaches today and how organizations in the cloud can adapt to this growing risk – listen in to unlock their expert insight.
Posted: 04 Feb 2021 | Premiered: Feb 4, 2021
|
|
|
Webinar - Defend Better and Respond Faster With Security That Works Together
sponsored by Cisco Umbrella
WEBCAST:
Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020
|
|
|
On the Cybersecurity Forefront
sponsored by Forcepoint
WEBCAST:
A new IDG survey shows that, while deployments of cloud apps continue to rise, securing them remains a challenge. However, 1/3 of respondents cite behavioral analytics as an effective tool to work past this. Tune in as Forcepoint's Zero Trust Security Solutions marketing director Jim Fulton digs into the survey findings with Bob Bragdon of IDG.
Posted: 11 Jan 2021 | Premiered: Jan 11, 2021
|
|
|
Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST:
Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020
|
|
|
AT&T Managed Threat Detection and Response Live Demo
sponsored by AT&T Cybersecurity
WEBCAST:
View this video for an overview of AT&T’s managed threat detection and response service as well as a live demo.
Posted: 15 Jan 2021 | Premiered: Jan 15, 2021
|
|
|
Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST:
Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020
|
|
|
How to Mitigate the Risk of Ransomware Attacks
sponsored by Keeper Security Inc
VIDEO:
Ransomware is becoming one of the most pervasive and consequential threats facing organizations. In this webinar, take a closer look at the key features and capabilities of the Keeper platform, designed to mitigate the risk of ransomware attacks.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020
|
|
|
Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST:
The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020
|
|
|
|
|