Search results


Respond: Strategies for Getting Back up and Running

Respond: Strategies for Getting Back up and Running

Channel Logo
Diana Kelley, Protect AI and Guests

So, you’ve been breached. What next? We’ve all heard the phrase “It’s not ‘if’, but ‘when’” when it comes to being a victim of a cybersecurity attack. As
such, response is just as crucial as prevention. But how can you set up your incident response approach and equip yourself with the essential strategies to
recover and rebuild your operations? Join Diana Kelley and guests in this episode as we discuss: - How to put together an effective incident response strat…

Steps To TruRisk: Step 2 - Take Inventory | Measuring Threats Accurately

Steps To TruRisk: Step 2 - Take Inventory | Measuring Threats Accurately

Channel Logo
Anthony Williams, Subject Matter Expert, VMDR; Colton Pepper, Product Marketing Manager; Colton Pepper, Product Marketing Manager; Russ Sanderlin, Director, SME, VMDR; Chinmay Inamdar, Lead Technical Trainer

Understanding your environment is essential, but accurately measuring real-world threats is transformative. Join <b>Colton Pepper, Product Marketing
Manager, and Anthony Williams, VMDR Subject Matter Expert</b>, along with special guests <b>Russ Sanderlin, Director of the VMDR SME Team, and
Chinmay Inamdar, Lead Technical Trainer</b>, on <b>April 8, 2025, at 11AM PT | 2PM ET</b> <i>for Steps To TruRisk: Step 2 - Take Inventory | Measuring …

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs

Cybersecurity Roundtable: Zero-Day Attacks, Exposing Weak Security Programs

Channel Logo
Adam Berger, CISO at Netrix Global

In today's rapidly evolving cybersecurity landscape, the window of opportunity for hackers is alarmingly short. Recent data reveals that 61% of the time,
hackers leverage new exploit code within just 2 days. With such a narrow timeframe, how can organizations possibly stay ahead of these threats? Join us for
an insightful roundtable discussion on Zero-Day Exploits. Our expert panel will delve into the critical role of effective governance and the identification of thr…

Securing AI 101: Breaking down the building blocks to enable secure AI transformation

Securing AI 101: Breaking down the building blocks to enable secure AI transformation

Channel Logo
Archana Ramamoorthy, Senior Director of Product Management, Google Cloud Security, and Dave Gruber, Principal Analyst, Enterprise Strategy Group

The AI era presents unprecedented opportunities and challenges, particularly for security professionals. This webinar, featuring Archana Ramamoorthy from
Google Cloud, and Dave Gruber from Enterprise Strategy Group, explores the critical security concerns arising from the rapid adoption of generative AI and
recommendations for how organizations can accelerate AI transformation securely. Based on a recent Enterprise Strategy Group showcase report, we'll de…

API Security Matters: The Risks of Turning a Blind Eye

API Security Matters: The Risks of Turning a Blind Eye

Channel Logo
Josh Goldfarb, F5 | Joe Martin, F5

In today's rapidly evolving cybersecurity landscape, ignoring critical security issues can lead to disastrous consequences. This webinar, "API Security Matters:
The Risks of Turning a Blind Eye," addresses the crucial topic of API Security, covering the lifecycle from code-based discovery to implementing lessons
learned. Join our expert speakers, Josh Goldfarb, Field CISO at F5, and Joe Martin, Sr. Solutions Architect at F5, as they share practical steps and real-world …

Ep. 3 - Ensure Cyber Resilience: Maximizing ROI on Your Zero Trust Journey with Akamai

Ep. 3 - Ensure Cyber Resilience: Maximizing ROI on Your Zero Trust Journey with Akamai

Channel Logo
Mike Swaminathan, Senior Solutions Engineer, Zero Trust security | Akamai

Zero Trust isn’t just about security—it’s a critical pillar of cyber resilience. But how do you measure its impact? In this final episode of our cyber resilience
webinar series, we’ll break down the real ROI of implementing Zero Trust and how Akamai Guardicore Segmentation helps you maximize security while
minimizing costs. Join us as we explore: -How to reduce attack surfaces and simplify compliance, and enhance operational security -How granular segmen…

Steps To TruRisk: Step 1 - Mind the Gap | Shifting to Priority-Driven Strategies

Steps To TruRisk: Step 1 - Mind the Gap | Shifting to Priority-Driven Strategies

Channel Logo
Anthony Williams, Subject Matter Expert, VMDR; Russ Sanderlin, Director, SME, VMDR; Colton Pepper, Product Marketing Manager Qualys

Are you prioritizing the right vulnerabilities, or just checking boxes? Join <b>Colton Pepper, Product Marketing Manager, Anthony Williams, Subject Matter
Expert, VMDR, and Russ Sanderlin, Director, SME, VMDR on March 25, 2025, at 11AM PT | 2PM ET</b> for <i>Steps To TruRisk: Step 1 - Mind the Gap |
Shifting to Priority-Driven Strategies</i>, the first episode in a five-part series designed to help organizations move from vulnerability management to true …

Today’s Modern is Tomorrow’s Legacy: Overcoming the Challenges of Protecting Legacy OT Systems in a Modern World

Today’s Modern is Tomorrow’s Legacy: Overcoming the Challenges of Protecting Legacy OT Systems in a
Modern World

Channel Logo
Lars Thoren, Solution Architect @ TXOne Networks

In today’s rapidly evolving digital landscape, many organisations in critical industries are tasked with the challenge of securing their operational technology
(OT), particularly legacy assets that are often excluded from modern cybersecurity strategies. This webinar will delve into the intricate challenges associated
with protecting these vital legacy systems and highlight the common industry practice of mandating their replacement—often detrimental from both a busi…

PCI-DSS 4.0 Explained

PCI-DSS 4.0 Explained

Channel Logo
John Waller, Cybersecurity Practice Lead – CCET Team

Join us for a webinar discussing the challenges organizations face in transitioning to PCI-DSS 4.0 and implementing new security measures. We will explore
the updates to the security framework and the critical need to secure APIs to protect sensitive payment information. Don't miss this opportunity to learn
about the latest in PCI-DSS 4.0 and how to effectively adapt to these new standards.

Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight

Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight

Channel Logo
Matthew McKenna, President, International Sales & Oleg Stryzhak, Senior Consultant, Cyber Risk Solutions (previously in charge of supply chain risk management at a global energy and petrochemical company)

DORA and NIS2 reinforce best practices for managing supply chain cyber hygiene, emphasizing a structured and compliant approach to information security.
Join SecurityScorecard as we explore how these frameworks guide organizations in strengthening third-party risk management, enhancing resilience, and
ensuring compliance. Gain practical insights on implementing effective security measures that align with regulatory expectations while proactively safeguar…