Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Webinars
You are here: Home \ Resources \ Webinars

Upcoming Webinar

No upcoming webinar.

Webinars On Demand

null

Vulnerability Management – Closing the Door on Attacks

Presenter: Andrew Kozloski

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • Best practices concerning vulnerability, asset, change, and risk management
  • Common challenges that organizations face through implementation
  • Real World solutions implemented in large, security-focused organizations
  • How Vulnerability Management should be utilized in Security Program Design

null

NIST, CIS/SANS 20, and ISO 27001 Security Control Frameworks Finally Made Simple

Presenter: Chris Burrows

Presenter: Chris Burrows

In this webinar you will learn about:

  • The Value of NIST, CIS/SANS 20, and ISO 27001 Frameworks
  • How Just 36 out of the 379 Controls Provide Critical Insight
  • How the Controls are Assessed using CySAFE
  • How CySAFE Evaluates your Controls using Cost, Time, & Risk
  • How to Prioritize IT Security Goals using the Gap Analysis

null

How Cyber Resilience is Changing Cyber Security

Presenter: Keith Deighton


Presenter: Keith Deighton

In this webinar you will learn about:

  • Why Preventing Every Attack is Impossible
  • Why Incidents and Breaches Stay Undetected
  • The Critical Steps to Improve Your Cyber Resilience
  • Adopting Controls and Best Practices in Your Organization <l/i>
  • How to Focus on Continuing Service Improvement (CSI)

null

How Active Cyber Defense (ACD) – The Evolution of Cybersecurity

Presenter: Chet Hosmer


Presenter: Chet Hosmer

In this webinar you will learn about:

  • Why DARPA evolved cyber defense and how ACD was created
  • How ACD will thwart the most sophisticated attacks
  • The critical components of ACD
  • How to implement ACD in your organization

null

How Your Adversaries Conduct ICSAttacks

Presenter: Derek Trumble

null

Incident Response: Keys to Improving Response to a Cyber Security Incident

Presenter: Twyla Pateman & David Violago


Presenter: Twyla Pateman & David Violago

In this webinar you will learn about:

  • Why Organizations Fail to Stop the Damage
  • The Components of an Effective Incident Response Plan
  • How to Prepare Your Computer Security Incident Response Team (CSIRT)
  • Leveraging ISO and NIST Standards
  • Evolving Your Response to Thwart Attacks

null

The 4 Benefits of Conducting a Vulnerability Assessment

Presenter: Andrew Kozloski


Presenter: Andrew Kozloski

In this webinar you will learn about:

  • The value and process of cataloging assets and resources
  • Assigning importance or ranks to the business criticality of those resources
  • Identifying the vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

null

The Anatomy of A Phishing Attack

Presenters: Ryan Duquette and Andrew Kozloski


Presenters: Ryan Duquette and Andrew Kozloski

In this webinar you will learn about:

  • Why phishing attacks are so successful
  • The cybercriminals design to deploy the scam
  • The challenge to stopping the attacks
  • How phishing and ransomware siphon billions
  • How to protect yourself and your organization

null

The Developing World of Cyber Litigation and Compliance

Presenter: Vanessa Henri


Presenter: Vanessa Henri

In this webinar you will learn about:

  • Cybersecurity safeguards that meet legal standards
  • Corporate legal obligations in terms of incident response planning
  • Solutions that can protect your company and your executives from responsibility

null

Shut Down Mirai and DDoS Attacks on Your Organization

Presenters: Ron Winward and Andrew Kozloski


Presenters: Ron Winward and Andrew Kozloski

In this webinar you will learn about:

  • Best practices to identify attacks in real time
  • How DDoS attacks slip through traditional security defenses
  • Latest technology trends that can aid in stopping botnets
  • How to protect organizations from future attacks like Mirai

null

Learning How HackersHack

Presenter: Andrew Kozloski


Presenter: Andrew Kozloski

In this webinar you will learn about:

  • How to conduct a world-class penetration test
  • The 6 essential elements of a penetration test
  • The 6 benefits of a penetration test

null

Why Perform Threat Risk Assessments

Presenter: Llewellyn Derry

null

The “Big Bang” of IoT, Mobile, Cloud and Analytics

Presenters: Paul Lewis and Andrew Kozloski

null

How to Pass a Security Audit in One Day

Presenter: Tim McCreight