Webinars
You are here: Home \ Resources \ Webinars

Upcoming Webinar

How Cyber Resilience is Changing Cyber Security | July 26, 2017 at 2:00 PM ET

 

Presenter: Keith Deighton

In this webinar you will learn about:

  • Why Preventing Every Attack is Impossible
  • Why Incidents and Breaches Stay Undetected
  • The Critical Steps to Improve Your Cyber Resilience
  • Adopting Controls and Best Practices in Your Organization
  • How to Focus on Continuing Service Improvement (CSI)

Webinars On Demand

How Active Cyber Defense (ACD) – The Evolution of Cybersecurity

 

Presenter: Chet Hosmer

In this webinar you will learn about:

  • Why DARPA evolved cyber defense and how ACD was created
  • How ACD will thwart the most sophisticated attacks
  • The critical components of ACD
  • How to implement ACD in your organization

How Your Adversaries Conduct ICS Attacks

 

Presenter: Derek Trumble

In this webinar you will learn about:

  • The Main Components of a Control System
  • How Malware Typically Attacks and Disrupts Critical Systems
  • How Connectivity and Access Advancements Increase Security Gaps
  • The 3 Steps That Will Improve ICS Security Immediately

The 4 Benefits of Conducting a Vulnerability Assessment

 

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • The value and process of cataloging assets and resources
  • Assigning importance or ranks to the business criticality of those resources
  • Identifying the vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

The Anatomy of A Phishing Attack

 

Presenters: Ryan Duquette and Andrew Kozloski

In this webinar you will learn about:

  • Why phishing attacks are so successful
  • The cybercriminals design to deploy the scam
  • The challenge to stopping the attacks
  • How phishing and ransomware siphon billions
  • How to protect yourself and your organization

The Developing World of Cyber Litigation and Compliance

 

Presenter: Vanessa Henri

In this webinar you will learn about:

  • Cybersecurity safeguards that meet legal standards
  • Corporate legal obligations in terms of incident response planning
  • Solutions that can protect your company and your executives from responsibility

Shut Down Mirai and DDoS Attacks on Your Organization

 

Presenters: Ron Winward and Andrew Kozloski

In this webinar you will learn about:

  • Best practices to identify attacks in real time
  • How DDoS attacks slip through traditional security defenses
  • Latest technology trends that can aid in stopping botnets
  • How to protect organizations from future attacks like Mirai

The “Big Bang” of IoT, Mobile, Cloud and Analytics

 

Presenters: Paul Lewis and Andrew Kozloski

In this webinar you will learn about:

  • The 3 ways that digital transformation will enhance your business
  • How to transform unstructured data into profitable insights
  • Which technologies and companies will lead this evolution
  • How to execute your strategy with security in mind

How to Pass a Security Audit in One Day

 

Presenter: Tim McCreight

In this webinar you will:

  • Understand how an effective, control-based security program can help you address audit requirements
  • Identify the types of controls that your business needs to comply to regulations
  • Learn how to implement these controls, and how you can demonstrate that your controls are working (and not just on paper)
  • Find out how our guest speaker passed an internal security control audit in one day using a control-based approach

Learning How Hackers Hack

 

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • How to conduct a world-class penetration test
  • The 6 essential elements of a penetration test
  • The 6 benefits of a penetration test

Why Perform Threat Risk Assessments

 

Presenter: Llewellyn Derry

In this webinar you will:

  • Understand the risk associated with injury to an asset
  • Understand the risk expressed as a value
  • Evaluate the value of threat risk assessments to prioritize the investment in your security program