Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Webinars
You are here: Home \ Resources \ Webinars

Webinars On Demand

null

The Next Generation of Managed Security

In collaboration with PCM.

Jan 31st 2 PM EST

In today’s digitalized world, companies of all types and sizes need to protect their critical data assets against cyberattacks.

In this live panel discussion, you will:
• Learn more about how managed security services can protect your business
• Find out how strategic security controls can strengthen your cybersecurity posture
• Understand how to maximize your return on security investment (ROSI)
• Get executive insights on best practices for threat monitoring and incident response

null

Reporting Data Privacy Obligations to the Board:

A Practical Approach to Ongoing Compliance.
In collaboration with Nymity.

Feb 5th 11AM EST

Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. Unfortunately, DPOs and CPOs are often left with these critical questions:

What happens once your basic privacy obligations have been implemented?
How can you establish an effective privacy reporting framework?
How can you effectively report on your privacy risk and progress to your Board of Directors?

boardmeeting-3

IT Pros Security Challenges: What Decision Makers Want to Hear

Panel Discussion

In this webinar you will learn about:

- Find out common mistakes made by IT pros when it comes to building their security strategy
- Get executive insights on IT pros’ challenges and how to go about them
- Understand why it is important to align your security strategy with overall business goals
- Learn actionable tips to get executive buy-in

Beyond GDPR Webinar

Beyond GDPR: Implementing a Comprehensive Privacy Compliance Program

Presenter: Paul Breitbarth

Presenter: Paul Breitbarth

In this webinar you will learn about:

  • How to develop a tailored GDPR program for your business context
  • The role of the Data Protection Officer and ownership of a privacy program
  • Upcoming legislative updates in different jurisdictions
  • How to create a privacy program and the next steps to take
  • Case studies of GDPR compliance projects in small and enterprise businesses

SANS Institute CIS Critical Security Controls

Managing the CIS Critical Security Controls within Your Enterprise

Presenter: Matt Bromiley

Presenter: Matt Bromiley

In this webinar you will get:

  • An overview of the CIS Critical Security Controls
  • An in-depth examination of some of the most critical controls
  • Real world case studies of actual breaches where controls were not in place, and how this impacted the organization
  • Best practice insight into how organizations can manage and track the implementation of security controls

null

Vulnerability Management – Closing the Door on Attacks

Presenter: Andrew Kozloski

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • Best practices concerning vulnerability, asset, change, and risk management
  • Common challenges that organizations face through implementation
  • Real World solutions implemented in large, security-focused organizations
  • How Vulnerability Management should be utilized in Security Program Design

null

NIST, CIS/SANS 20, and ISO 27001 Security Control Frameworks Finally Made Simple

Presenter: Chris Burrows

Presenter: Chris Burrows

In this webinar you will learn about:

  • The Value of NIST, CIS/SANS 20, and ISO 27001 Frameworks
  • How Just 36 out of the 379 Controls Provide Critical Insight
  • How the Controls are Assessed using CySAFE
  • How CySAFE Evaluates your Controls using Cost, Time, & Risk
  • How to Prioritize IT Security Goals using the Gap Analysis

null

How Cyber Resilience is Changing Cyber Security

Presenter: Keith Deighton

Presenter: Keith Deighton

In this webinar you will learn about:

  • Why Preventing Every Attack is Impossible
  • Why Incidents and Breaches Stay Undetected
  • The Critical Steps to Improve Your Cyber Resilience
  • Adopting Controls and Best Practices in Your Organization <l/i>
  • How to Focus on Continuing Service Improvement (CSI)

null

How Active Cyber Defense (ACD) – The Evolution of Cybersecurity

Presenter: Chet Hosmer

Presenter: Chet Hosmer

In this webinar you will learn about:

  • Why DARPA evolved cyber defense and how ACD was created
  • How ACD will thwart the most sophisticated attacks
  • The critical components of ACD
  • How to implement ACD in your organization

null

How Your Adversaries Conduct ICSAttacks

Presenter: Derek Trumble

null

Incident Response: Keys to Improving Response to a Cyber Security Incident

Presenter: Twyla Pateman & David Violago

Presenter: Twyla Pateman & David Violago

In this webinar you will learn about:

  • Why Organizations Fail to Stop the Damage
  • The Components of an Effective Incident Response Plan
  • How to Prepare Your Computer Security Incident Response Team (CSIRT)
  • Leveraging ISO and NIST Standards
  • Evolving Your Response to Thwart Attacks

null

The 4 Benefits of Conducting a Vulnerability Assessment

Presenter: Andrew Kozloski

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • The value and process of cataloging assets and resources
  • Assigning importance or ranks to the business criticality of those resources
  • Identifying the vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

null

The Anatomy of A Phishing Attack

Presenters: Ryan Duquette and Andrew Kozloski

Presenters: Ryan Duquette and Andrew Kozloski

In this webinar you will learn about:

  • Why phishing attacks are so successful
  • The cybercriminals design to deploy the scam
  • The challenge to stopping the attacks
  • How phishing and ransomware siphon billions
  • How to protect yourself and your organization

null

The Developing World of Cyber Litigation and Compliance

Presenter: Vanessa Henri

Presenter: Vanessa Henri

In this webinar you will learn about:

  • Cybersecurity safeguards that meet legal standards
  • Corporate legal obligations in terms of incident response planning
  • Solutions that can protect your company and your executives from responsibility

null

Shut Down Mirai and DDoS Attacks on Your Organization

Presenters: Ron Winward and Andrew Kozloski

Presenters: Ron Winward and Andrew Kozloski

In this webinar you will learn about:

  • Best practices to identify attacks in real time
  • How DDoS attacks slip through traditional security defenses
  • Latest technology trends that can aid in stopping botnets
  • How to protect organizations from future attacks like Mirai

null

Learning How HackersHack

Presenter: Andrew Kozloski

Presenter: Andrew Kozloski

In this webinar you will learn about:

  • How to conduct a world-class penetration test
  • The 6 essential elements of a penetration test
  • The 6 benefits of a penetration test

null

Why Perform Threat Risk Assessments

Presenter: Llewellyn Derry

null

The “Big Bang” of IoT, Mobile, Cloud and Analytics

Presenters: Paul Lewis and Andrew Kozloski

null

How to Pass a Security Audit in One Day

Presenter: Tim McCreight