Webinars

Webinars

  • Overcome the Challenges of EDR with Advanced NDR

    As network environments get more complex (e.g., work from home users, BYOD and IoT devices, workloads migrated to public clouds), relying solely upon SIEM and End Point Detection and Response (EDR) solutions is not enough for effective cybersecurity. This session will explore challenges these solutions face and the advantages you gain with advanced Network Detection and Response (NDR): • Gain packet level visibility across your entire network environment (including public cloud) • Fill the gaps in visibility left by EDR solutions • Easily integrate into and complement an existing cybersecurity stack, improving an organization’s overall cybersecurity posture We will introduce NETSCOUT’s advanced NDR solution, Omnis Cyber Intelligence, and demonstrate how it can improve incident response. Read More

  • Cybersecurity Metrics, KPIs and KRIs

    This session provides practical advice to establish cybersecurity metrics, Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs). We begin with an explanation of the differences between them and why each are needed. Examples of how to design metrics, KPIs and KRIs are provided. Areas of focus include cybersecurity measurements for all organizations, for processes & functions and in alignment with a control framework. The end game is to measure if processes and controls are functioning as designed. We also walk through tips for communicating new metrics and go-to-green updates for metrics in red or yellow status. The session includes 22 metrics and seven resources for many more. All of this saves time and can assist with enhancing your program. About the speaker: Gideon Rasmussen is a Cybersecurity Management Consultant with over 20 years of experience in corporate and military organizations. Gideon has designed and led programs including Information Security (CISO), PCI - Payment Card Security, Third Party Risk Management, Application Security and Information Risk Management. Has diverse cybersecurity industry experience within banking, insurance, pharmaceuticals, DoD/USAF, state government, advertising and talent management. Gideon has authored over 30 information security articles. He is a veteran of the United States Air Force, a graduate of the FBI Citizens Academy and a recipient of the Microsoft Most Valuable Professional award. Gideon has also completed the Bataan Memorial Death March (4 occurrences). He is certified in many programs including CISSP, CRISC, CISA, CISM, CIPP, ITILv3, and NSA-IAM. Read More

  • Bolstering Security in the Era of Remote Work

    IT and security teams across industries are supporting increasingly distributed workforces and a growing number of device options. Meanwhile, identity-based attacks are the top threat to organizations today, with a Verizon report from 2021 finding that 45% of organizations have suffered a breach due to identity-related threats. Staying ahead of these risks is critical, but since traditional approaches to identity security are often fragmented, complex, and lack agility, this is no easy feat. By adopting an identity-first approach to security, organizations can elevate their security posture and reduce friction as they adopt hybrid and fully remote working models. In this 45 minute discussion, ESG Senior Analyst Jack Poller is joined by Ryan Terry, Senior Solutions Product Marketing Manager at Okta, to discuss the role of identity in the modern security stack and explore tips and best practices for teams looking to bolster security and drive productivity across a distributed workforce. Topics for discussion include: - How to think about adopting an identity-first approach to security - Balancing security with usability: How an identity-first mindset can mitigate risk while empowering distributed workforces - Understanding Zero Trust: Why organizations are adopting the approach and how to decide if it’s right for your organization - And more... Read More

  • Start Gathering Your Own Threat Intelligence

    Traditional threat intel is broken. We’re trained to conduct threat intel analysis based on what the industry has given us: wordy threat intel reports, long lists of indicators of compromise with little context, and TTPs that are difficult to take action on. Cyber deception, however, gives contextualized rich intelligence on attacker activity. Advanced deception environments, tailored to your attack surface, offer the next generation of threat intelligence collection and analysis. Deception environments are exceptionally effective because they generate known “bad” data. No one should be messing with them. The data they collect is clear and unequivocal. See how they offer clear signals in all the noise. Read More

  • How to Stay Safe While Working Virtually

    Over the past two years, virtual work has exploded and become the new normal for organizations, schools, and government. But with this new normal has come new dangers for staying safe and secure. CyberVista's George Monsalvatge wants to ensure users stay safe when connecting to networks from a variety of locations. In this presentation, he'll cover: - Checking network connections. - Signs of compromise. - How to stop breaches. Read More

  • Threat Intelligence in action

    Access to independent, current, globally sourced cyber threat intelligence at no charge. We anticipate that the current conflict will lead to a growing number of cyberthreats. Threat actors will be trying to exploit the ongoing crisis for their own ends. To confront this potential wave of cyberattacks, businesses worldwide need to have access to trusted and timely threat intelligence. Kaspersky are industry leaders in Cyber Threat Intelligence. At Kaspersky, we are pleased to announce, we are offering you access to some of our very latest threat intelligence at no cost. Join our webinar to understand more about the features, and see a demonstration. In this webinar Lee Rendell, Senior Presales Manager at Kaspersky UK, will talk you through what Kaspersky Threat intelligence service provides and why we are providing you access to the portal, the intelligence, and at no charge. We will run you through a demo of the Threat Intelligence Portal, to help you understand how this solution can benefit you and your organisation. Read More

  • It’s Not the Silicon, it’s the Carbon — Those Darn Humans

    While the threat landscape continues to evolve at a rapid pace, organizations typically overlook (or poorly perform) the most foundational aspect of building a strong defensive posture -- the human element. Whether it is misconfiguring a system, clicking on a malicious link, or failing to detect or respond to an anomalous event, most breaches are successful because of human error or inattention. Tune into this webinar to learn: - The key areas where humans create weaknesses. - Review some common tricks that allow attackers in. - Changing the mindset of your organization to be more security aware. - Where to begin along with several takeaways. Read More

  • Secure Code Review: Catching Vulnerabilities at the Source

    Security vulnerabilities discovered in applications are almost always rooted in security flaws in source code. Here, weaknesses may be logical errors, missing validation, insufficient logging, poor secrets management, missing user permissions checks, unsafe string concatenation, misconfigurations, and much more. In this session, you'll learn the importance of incorporating secure code review in the software development lifecycle. While automated scans are helpful and powerful tools, they're no replacement for code review by human experts. Read More

  • Building Your Security Strategy To Manage Change

    Heraclitus, a Greek philosopher, is quoted as saying "change is the only constant in life." It is no surprise this also applies to the information security world we are a part of. The threat landscape is constantly evolving as are the industry and regulatory requirements organizations must adhere to. How then are we to maintain a security strategy that accounts for these ever-changing factors? In this live session, we will discuss the key components of a sound security strategy and how to identify and address the changing threats, requirements, and other factors impacting your strategy. Read More