Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Webinars
You are here: Home \ Resources \ Webinars

Upcoming Webinar

NIST, CIS/SANS 20, and ISO 27001 Security Control Frameworks Finally Made Simple

 

Presenter: Chris Burrows

In this webinar you will learn about:

  • The Value of NIST, CIS/SANS 20, and ISO 27001 Frameworks
  • How Just 36 out of the 379 Controls Provide Critical Insight
  • How the Controls are Assessed using CySAFE
  • How CySAFE Evaluates your Controls using Cost, Time, & Risk
  • How to Prioritize IT Security Goals using the Gap Analysis

Webinars On Demand

Incident Response: Keys to Improving Response to a Cyber Security Incident

 

Presenter: Twyla Pateman & David Violago

In this webinar you will learn about:

  • Why Organizations Fail to Stop the Damage
  • The Components of an Effective Incident Response Plan
  • How to Prepare Your Computer Security Incident Response Team (CSIRT)
  • Leveraging ISO and NIST Standards
  • Evolving Your Response to Thwart Attacks

How Cyber Resilience is Changing Cyber Security

 

Presenter: Keith Deighton

In this webinar you will learn about:

  • Why Preventing Every Attack is Impossible
  • Why Incidents and Breaches Stay Undetected
  • The Critical Steps to Improve Your Cyber Resilience
  • Adopting Controls and Best Practices in Your Organization
  • How to Focus on Continuing Service Improvement (CSI)

How Active Cyber Defense (ACD) – The Evolution of Cybersecurity

 

Presenter: Chet Hosmer

In this webinar you will learn about:

  • Why DARPA evolved cyber defense and how ACD was created
  • How ACD will thwart the most sophisticated attacks
  • The critical components of ACD
  • How to implement ACD in your organization

How Your Adversaries Conduct ICS Attacks

 

Presenter: Derek Trumble

In this webinar you will learn about:

  • The Main Components of a Control System
  • How Malware Typically Attacks and Disrupts Critical Systems
  • How Connectivity and Access Advancements Increase Security Gaps
  • The 3 Steps That Will Improve ICS Security Immediately

The 4 Benefits of Conducting a Vulnerability Assessment

 

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • The value and process of cataloging assets and resources
  • Assigning importance or ranks to the business criticality of those resources
  • Identifying the vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

The Anatomy of A Phishing Attack

 

Presenters: Ryan Duquette and Andrew Kozloski

In this webinar you will learn about:

  • Why phishing attacks are so successful
  • The cybercriminals design to deploy the scam
  • The challenge to stopping the attacks
  • How phishing and ransomware siphon billions
  • How to protect yourself and your organization

The Developing World of Cyber Litigation and Compliance

 

Presenter: Vanessa Henri

In this webinar you will learn about:

  • Cybersecurity safeguards that meet legal standards
  • Corporate legal obligations in terms of incident response planning
  • Solutions that can protect your company and your executives from responsibility

Shut Down Mirai and DDoS Attacks on Your Organization

 

Presenters: Ron Winward and Andrew Kozloski

In this webinar you will learn about:

  • Best practices to identify attacks in real time
  • How DDoS attacks slip through traditional security defenses
  • Latest technology trends that can aid in stopping botnets
  • How to protect organizations from future attacks like Mirai

The “Big Bang” of IoT, Mobile, Cloud and Analytics

 

Presenters: Paul Lewis and Andrew Kozloski

In this webinar you will learn about:

  • The 3 ways that digital transformation will enhance your business
  • How to transform unstructured data into profitable insights
  • Which technologies and companies will lead this evolution
  • How to execute your strategy with security in mind

How to Pass a Security Audit in One Day

 

Presenter: Tim McCreight

In this webinar you will:

  • Understand how an effective, control-based security program can help you address audit requirements
  • Identify the types of controls that your business needs to comply to regulations
  • Learn how to implement these controls, and how you can demonstrate that your controls are working (and not just on paper)
  • Find out how our guest speaker passed an internal security control audit in one day using a control-based approach

Learning How Hackers Hack

 

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • How to conduct a world-class penetration test
  • The 6 essential elements of a penetration test
  • The 6 benefits of a penetration test

Why Perform Threat Risk Assessments

 

Presenter: Llewellyn Derry

In this webinar you will:

  • Understand the risk associated with injury to an asset
  • Understand the risk expressed as a value
  • Evaluate the value of threat risk assessments to prioritize the investment in your security program