Webinars

Webinars

  • Passwordless Authentication: Better Security with Frictionless Login Experiences

    Passwords have always a source of friction and a security risk in the authentication experience. Leaving passwords behind is key towards better security and employee login experiences. Okta has been helping its customers deploy passwordless authentication by taking foundational steps such as implementing multi-factor authentication (MFA) with secure factors such as FIDO2.0/WebAuthn, FastPass, MagicLink, and mobile authenticator apps that support biometric authentication.  Join us in this session to understand how Okta FastPass enables secure passwordless authentication into any device, from any location. Even if your company uses a combination of device management tools, FastPass can work alongside a variety of deployments. * Watch this 30-minute webinar now and see Mukul Hinge, Group Product Marketing Manager, Security at Okta demonstrate FastPass in action including how: * Users can register their devices to Universal Directory using Okta Verify. * Admins can set policies for when Okta FastPass should be delivered. * Okta Verify can check policies set by administrators, and allow a user to log in assuming the login meets the correct context. Read More

  • Your Security Metrics Are Lying (And What To Do About It)

    Measuring the impact of security operations in reducing risk can be incredibly difficult. This challenge is compounded when poor metrics, that do not meaningfully reflect the work done by security teams, mask systemic problems. This is something we must get right to justify ever-growing investments in defensive teams, tools, and process. In this webinar, discover some commonly accepted security metrics that rarely tell a complete or compelling story and why they fall short. With that, attendees will learn better ways to identify high-quality metrics that tell a better (and more honest) story. Attendees will leave the session with an understanding of: • What makes a metric useful in defense operations; • Commonly used security metrics and how they hide the truth; • An approach to picking compelling, comprehensive security metrics. Read More

  • A Road Less Traveled: Learning the Value of SME Enterprise Security Management

    Covid has seen the SME adopt technology at a fast and furious pace -- but at what cost? With this adoption comes an increase in cybersecurity risks. Cybercriminals have acquired newer and better techniques, but their SME targets have yet to recognize the need for an Enterprise Security Management framework to establish and sustain security for critical infrastructure. Join BCyber’s Co-Founder & CEO Karen Stephens as she unlocks the mysteries of Enterprise Security Management in 2022 for the SME. Today, through the lens of an SME, you will gain an introductory understanding of: • What Enterprise Security Management is; • Why it is important; • Practical steps on how you can start your journey. Read More

  • Limiting the Impact of Future Ransomware Threats

    Cyberattackers are not showing any signs of slowing down -- in fact, cyberattacks are worsening. Several factors are responsible for that with some being directly linked to the global pandemic – thanks, COVID! Infosec teams must change their security practices to address the challenges of today and the future. In this conversation among experts, you will gain insights to help you keep your organization secure in an evolving threat landscape. Learn how can you limit the impact of future ransomware and supply chain attacks, how you can differentiate cloud security solutions, and more. Moderated by: Melinda Marks, Senior Analyst, ESG Featuring: Matt Hathaway, Chief Strategy & Marketing Officer, TrueFort Read More

  • Limiting the Impact of Future Ransomware Threats

    Cyberattackers are not showing any signs of slowing down -- in fact, cyberattacks are worsening. Several factors are responsible for that with some being directly linked to the global pandemic – thanks, COVID! Infosec teams must change their security practices to address the challenges of today and the future. In this conversation among experts, you will gain insights to help you keep your organization secure in an evolving threat landscape. Learn how can you limit the impact of future ransomware and supply chain attacks, how you can differentiate cloud security solutions, and more. Moderated by: Melinda Marks, Senior Analyst, ESG Featuring: Matt Hathaway, Chief Strategy & Marketing Officer, TrueFort Read More

  • Leverage Network Data To Minimize Your Cybersecurity Risk

    Securing your network against bad actors requires visibility to detect and respond to the inevitable attacks on your organization. You can’t stop what you can’t see! The good news is you have the data you need in your network data. The bad news is that you may not be using that data to identify and mitigate cyberattacks. Join us in this webinar to learn the innovative ways that Advanced Network Detection and Response, based on scalable deep packet inspection from your network, will help your organization achieve comprehensive security protection with: • Always on, real-time detection of network activity to halt attackers in their tracks • Visibility into your dynamic attack surface and its traffic • Lateral movement tracking of attack to respond and mitigate quickly • Unlimited historical perspective of attack Read More

  • The steps to sensible auto-remediation

    Timely remediation: It’s critical to responding to active threats in an environment. Knowing when (and when not) to apply automation is equally important. Given the speed at which threat actors can progress through the attack lifecycle, configuring automated remediation steps can go a long way. Hear how Expel approaches incident response and puts auto-remediation into practice. Read More

  • It’s Time to Modernize Threat Detection

    Threats like malware and denial-of-service attacks have been around since the earliest days of the internet, and the cybersecurity industry has created generations of threat detection and response tools to identify and remediate them. As security threats continue to evolve and advance, the tools to identify and stop them need to evolve as well. This panel of security experts will explore how security teams can shift form using reactive to proactive measures, utilizing a host of emerging tools and technologies. Join us to learn about: --Endpoint-focused technologies such as XDR --AI's role in reshaping threat detection --Threat detection and intelligence services --Security observability tools that improve breach detection --Using tools within a zero-trust framework to limit vulnerabilities Panelists: Steve Cobb, CISO at One Source Communications Dave Stufflebeam, Principal Sales Engineer at Digital.ai More to join soon! Read More

  • Understand Threat Detection and Response Solutions and Services

    Threat detection has become an important consideration for entities of all sizes and verticals. What originally began as logging and security-centric alerting by point products has morphed into a multi-million dollar industry of threat detection and response solutions and services. Offerings are comprised of vendor-agnostic log collection, analytics and correlation capabilities, threat intelligence feeds, and other tools geared towards reducing mean time to detect and respond. In this session, we’ll review the evolution of log collection and discuss the major components of today’s detection services and solutions. Viewers who are debating whether to outsource their detection and investigation needs or build their own SOC teams and manage their own solution will come away with much food for thought. Read More

  • Pipe Dream No More: The Evolution of Prevention-First Cybersecurity

    Organisations have never been more connected or vulnerable. Threats evolve at rapid pace and cybersecurity has failed to keep up. Proactive and preventive cybersecurity measures have previously been little more than an aspiration. No more! Machine learning and artificial intelligence allows us to stop cyberthreats in their tracks. Join Jonathan Jackson – Director Sales Engineering, from the BlackBerry Cybersecurity team in APAC to learn: - The current cybersecurity trends - What’s changed? - How you can apply prevention-first security to your own organisation to combat cyber threats. It’s time to outsmart and outlast modern cyber threats. Read More