Cybercast
In today’s lightning-fast business landscape, the stakes for manufacturers have never been higher. The digital transformation driving innovation is also expanding the attack surface at an alarming rate. Outdated legacy systems and the rapid proliferation of smart factories have created a perfect storm of vulnerabilities. CISOs are caught in ...
More info Cybercast
As application security (AppSec) continues to be a critical component of cybersecurity, organizations must stay informed about the evolving threats and best practices in this area. Join us for an essential hot topics webcast where leading experts will provide a detailed forecast of the AppSec landscape and offer strategic guidance for late 2024 an...
More info Cybercast
The cybersecurity landscape is constantly evolving, and CISOs are inundated with new tools and technologies, each promising to be the ultimate solution. But what do you really need, and what’s just noise? How can you go beyond the buzz and measure the effectiveness of these tools and avoid common pitfalls? Are you ‘overstacking’ ...
More info Cybercast
Third-party identities present both opportunities and risks, opening doors to new business while also posing security challenges. The latest report from S&P Global Market Intelligence, commissioned by Thales, highlights the crucial role of Business-to-Business Identity and Access Management (B2B IAM) in securing the extended enterprise. Legacy...
More info Cybercast
Is Your Browser the Weakest Link in Your Security Chain? Zero Trust has been the gold standard in cybersecurity for over a decade, but most organizations are still struggling to implement it where it matters most: the browser. As more applications move to the web, hackers are exploiting this gap with increasingly sophisticated tactics, leaving tra...
More info Cybercast
Join us for a conversation about the hours that immediately follow a suspected cyber incident. We’ll ditch the buzzwords and jargon and dive into the messy, chaotic reality of incident response. Our 1:1 conversation will include war stories, lessons learned, and the hard-won wisdom gained from leading organizations through the fire. We will ...
More info Cybercast
After eight years of submission review, testing, and evaluation, NIST has formally announced the PQC standard specifications, setting in motion the largest cryptographic transition in the history of computing – replacing legacy encryption with PQCs. The multiyear crypto migration is certain to usher in new challenges, uncertainties, and risks. Thi...
More info Cybercast
Like many large organizations, IBM found itself trying to manage a fragmented and inefficient Identity and Access Management (IAM) landscape, riddled with legacy systems that hindered scalability, compliance, and operational efficiency. The company managed to turn things around with help from Saviynt.This webcast will explore how IBM successfully ...
More info Cybercast
As cloud adoption accelerates, securing cloud environments remains a top priority for organizations. Join us for an insightful hot topics webcast where industry experts will provide a comprehensive forecast of cloud security trends and offer strategic guidance for late 2024 and early 2025. This session will cover the latest threats, best practices...
More info Cybercast
As the digital landscape continues to evolve, identity management remains a critical component of cybersecurity strategy. Join us for a timely webcast where leading experts will provide essential guidance on navigating identity challenges and opportunities anticipated in late 2024 and early 2025. This session will explore the latest trends in iden...
More info Cybercast
This month of CISO Stories will look at the findings of a cross-sector task force of CISOs and staff who shared details of their incident management best practices, including incident response plans, playbooks, metrics, and business continuity plans.
The Incident Management Best Practices Guide presents a framework and components for the incide...
More info Cybercast
CISOs today face the daunting task of managing a myriad of vulnerabilities and misconfigurations within their organizations’ IT infrastructures. Join us as we explore strategies for differentiating and addressing vulnerabilities versus misconfigurations, ensuring that the most pressing risks are mitigated promptly. We will discuss best pract...
More info Cybercast
Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary to leaking Personally Identifiable Informat...
More info Cybercast
Ransomware attacks continue to evolve, presenting ever-increasing threats to organizations worldwide. Join us for an in-depth hot topics webcast where industry experts will delve into the latest ransomware trends and provide actionable guidance to navigate the challenges anticipated in the latter half of 2024 and early 2025. This comprehensive ses...
More info Cybercast
Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats. The incident response challenge is further complicated as enterprises rapidly deploy cloud and container-based technologies and embrace a multi-cloud strategy. A n...
More info CybercastJoin us for a crucial webcast addressing the pivotal cloud security priorities that will define the second half of 2024. As organizations continue to embrace cloud technologies, the landscape of cloud security evolves at an unprecedented pace. Our expert panel will delve into the strategic imperatives crucial for securing cloud environments in the coming months. Explore topics ranging from the latest advancements in cloud security technologies to compliance considerations and proactive risk management strategies. Whether you’re migrating to the cloud or optimizing existing cloud infrastructure, this webcast will provide actionable insights to fortify your organization against evolving cyber threats.
More info Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer and Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will delve into the pivotal ro...
More info CybercastVulnerability management remains an uphill challenge for security teams. In this month of CISO Stories, we look at the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics include:
Managing vulnerabilities on premises, in the cloud, and in third-party environments
Identification, classification, prioritization, and remediation best practices
Standards and charters
Organizational structures
Scanning tools.
Supporting tools to be shared include a CISO’s Guide to Effective Vulnerabilities; and a Vulnerability Management Maturity Checklist.
Practitioners will also connect the dots on how effective vulnerability management can be used to continuously improve identity, application, cloud and network security, anti-ransomware efforts, zero trust, email security, threat intelligence, AI and third-party risk management.
More info Cybercast
Siloed identity tools and legacy complexity are the enemies of a modern identity program. There is a growing interest in tool convergence – specifically IGA and PAM convergence. The promise of simplicity, efficiency, improved security, and enhanced governance is appealing and can help protect identities from deepfakes and other AI-based threats. B...
More info Cybercast
A robust GRC program fosters the ability to manage key risks and protect sensitive data, aligning security initiatives with organizational objectives; and ultimately allows the CISO to establish trust and confidence with key stakeholders. However, the constantly evolving regulatory landscape is resource intensive to manage and requires striking a ...
More info CybercastThe next generation of cybersecurity solutions is built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics and more, and it’s delivered where security teams already work. Security leaders at leading enterprises are building their security program with Snowflake. When security applications are plugged into the security data lake in Snowflake, the apps are able to leverage data and insights to make better correlations. In this webinar, we will discuss:
How to leverage Snowflake as a security data lake and its ecosystem of cyber apps
Efficient strategies for building detection and vulnerability management security programs with Snowflake cyber apps
How customers like Xactly leverage Snowflake’s growing ecosystem of apps to derive value in less than 6 months
How Xactly thinks about their cyber mesh architecture for building scalable security program
More info Cybercast
Key objectives of a governance, risk, and compliance program (GRC) are to ensure that the cybersecurity program has appropriate oversight, identifies and addresses cyber risks, and complies with all applicable laws and regulations. GRC functions shape cybersecurity program components and its principal functions to reduce risk and meet all complian...
More info Cybercast
As organizations navigate the dynamic landscape of governance, risk, and compliance (GRC), join our webcast to explore the critical priorities that will shape the second half of 2024. In an environment marked by evolving regulations, heightened cyber threats, and a rapidly changing business landscape, staying ahead of GRC challenges is paramount. ...
More info Cybercast
Determining the most relevant cybersecurity metrics has long been discussed, but as high-profile attacks and regulatory scrutiny increases, effectively monitoring the progress and continued risk in a security program is paramount. In this panel, CISOs share their challenges and experiences implementing and expanding a metrics program and offer ins...
More info Cybercast
Most conversations around Identity Resilience focus on the prevention of attacks. But as statistics increasingly show that a major breach is a matter of “when”, not “if”, CISOs are realizing that their Identity Resilience strategy is missing a critical piece: response. In this conversation, we’ll explore Identity Resilience from the lens of B...
More info Cybercast
In the ever-evolving landscape of cyber threats, organizations are sitting on a goldmine of untapped potential within their existing security infrastructure. Our expert panel will guide you through innovative strategies to leverage your current tools for enhanced threat intelligence capabilities. Discover practical insights on optimizing SIEMs, le...
More info Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their organization’s defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will de...
More info Cybercast
CISOs strive to develop and use security metrics as an objective way to: (1) portray the state of their security programs; and (2) effect positive change to security controls, like patching within SLAs and improving phishing email awareness. However, they are challenged by data collection difficulties, limitations of reporting tools, and uncertain...
More info Cybercast
Amid concerns about data privacy and its ties to the Chinese government, President Biden recently signed a law banning TikTok nationwide unless it is sold, leaving security practitioners with a multitude of questions around the future of mobile app security. This SC Panelcast will explore the ongoing concerns around TikTok, how the potential ban m...
More info Cybercast
The rapid expansion of digital capabilities has moved sensitive data into various ecosystems, creating additional risk and compliance concerns for organizations. In this panel discussion, security leaders share their approach to striking the right balance of protecting data while enabling information sharing and innovation.
The discussio...
More info Cybercast
In today’s rapidly evolving threat landscape, enterprises face a daunting challenge: phishing attacks empowered by artificial intelligence (AI) and readily available phishing toolkits. Join this webinar to learn about the latest phishing trends, tactics, and predictions revealed in the Zscaler ThreatLabz 2024 Phishing Report. Experts from Th...
More info Cybercast
In this webcast, we unravel the insights and implications behind the latest global AI security guidelines, distilling complex recommendations into four key takeaways that every cybersecurity professional should know. As nations grapple with the rapid adoption of artificial intelligence, regulatory bodies worldwide have collaboratively devised comp...
More info Cybercast
AI is fundamentally changing how software is written. Developers are increasingly relying on code generated by leveraging generative AI tools and application security experts are scrambling to understand and mitigate security risks. To counteract this emerging threat, the developer community must take proactive measures and foster a culture of con...
More info Cybercast
By operating Records & Information Management (RIM) functions, data security and lifecycle management practices have been employed by organizations even before computing became the norm. However, these practices are continually stretched to keep pace with new technologies, like AI, which can pose threats to data confidentiality and integ...
More info Cybercast
It’s not rocket science, it’s network security. And yet for many organizations, the road to securing employees and information often results in trade-offs to performance, agility, scalable services, and user experience. While first-generation SASE solutions promised companies a way out of this complexity, those early deployments failed to resolve ...
More info Cybercast
The unique characteristics of OT systems – legacy equipment, long lifecycles, and the convergence with IT networks – complicates deploying traditional security approaches. And these inherent weaknesses in OT environments create a low-hanging and potentially lucrative target for threat actors, making it critical that security teams take steps to en...
More info Cybercast
Identity and Access Management (IAM) solutions are no longer just ways to provide easy workforce access to applications, but critical tools in security and zero trust network access, creating the first line of defense against malicious actors and insider threats. In this panel discussion, experts from CyberRisk Alliance and CyberArk will shar...
More info Cybercast
Cybersecurity tools, especially those experienced by end users, are often seen as blockers – built to create friction. We have been trained to believe that there must be a trade–off between security and user experience. If we are too strict users go around or just complain! Too lenient and we leave gaps for attackers to exploit. What if we b...
More info Cybercast
As traditional security paradigms falter in the face of sophisticated cyber threats, zero trust emerges as a beacon of resilience. Join our expert panel for an in-depth exploration of the evolving landscape of zero trust, where strict identity verification is paramount, and the concept of assumed trust is fundamentally challenged. Gain valuable in...
More info Cybercast
In the digital age, identity serves as both a shield and a sword in the realm of cybersecurity. Statistics reveal that 74% of breaches stem from the human element, highlighting the paradoxical nature of identity in the cyber era. This panel explores the interplay between social engineering and technological sophistication to detect these Identity ...
More info Cybercast
Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefor...
More info Cybercast
Managing the scope and complexity of third-party relationships can be a highly manual, time-consuming task for many security teams, and even after this effort effectively mitigating supply chain vulnerabilities remains one of the greatest threats to an organization’s security. In this panel discussion, security leaders share current approaches, ch...
More info Cybercast
Zero trust concepts are often muddied by misconceptions and industry jargon that can stump even the most senior security practitioners. This webinar will untangle the intricate facets of zero trust to help organizations advance and optimize their programs. Talking points include:
The biggest misconceptions around zero trust and how to gain a c...
More info Cybercast
Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers.
Attend this webinar to learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives.
Regist...
More info Cybercast
Join us as we unravel the intricacies and innovations shaping the future of network security. In an era of unprecedented connectivity, emerging technologies, and evolving cyber threats, the landscape of network security is undergoing transformative changes. Our experts will explore the key trends, challenges, and strategies that will define the fu...
More info Cybercast
AI presents both opportunities and challenges for security professionals and development teams. Snyk’s Edgar Kussberg will discuss the pitfalls AI can bring to secure development and will highlight key stats from Snyk’s recently released 2023 State of AI report to show how security teams can boost productivity while managing risk.Don’t...
More info Cybercast
A Third-Party Risk Management Implementation Guide and ToolkitThird parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk...
More info Cybercast
High-profile breaches continue to highlight the multiple risks to organizations from their supply chain. With increasingly interconnected third-party networks leading to even greater risk exposure, it is not surprising that supply chain security is a top priority for both regulators and organizations. It is undoubtedly time to evolve our approach ...
More info Cybercast
The technology world in 2030 promises a landscape radically transformed by unprecedented advancements. As the cloud engulfs everything, organizations will grapple with ephemeral technology, a surge in regulations, and an unrelenting need for speed that most organizations aren’t ready for. This webinar explores the future of compliance and risk in ...
More info Cybercast
Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI tools to help their company as well as define the acceptable risks and proper usage.
This panel discussi...
More info Webcast
Join us for a brilliant webinar titled “Where Industry Ideas Come to Life,” led by Andrew Hindle, the Conference Chair for Identiverse. This engaging panel discussion will feature a lineup of seasoned industry experts, including Allan Foster, David Brossard (CTO at Axiomatics), and Gerry Gebel (Strata Identity), who will delve deep int...
More info Cybercast
The cybercrime economy is thriving, driven by financially motivated bad actors who have established lucrative “dark” businesses in the light of day. Bad actors prioritize efficiency to maximize their illicit earnings, using bots for everything from buying up coveted concert tickets to draining bank accounts to even more sinister endeavors to human...
More info Cybercast
There is often no better teacher than failure. Instead of waiting to learn from your own failures, why not learn from others? Find out what third party breaches can teach us about third party risk and vendor due diligence! This webcast with Bill Brenner and Enterprise Security Weekly host Adrian Sanabria will walk through:
Improving the vendor...
More info Cybercast
Balancing tight security budgets with growing threats is challenging for resource-limited IT teams. Taking the right approach, even organizations with 50 – 2,000 employees can build resilient and effective cybersecurity.
Learn proven methods for strengthening security from industry experts.
Moderated by Bill Brenner of CyberRisk Allian...
More info Cybercast
Security teams need more from their tools – full stop. Cyware’s Threat Intelligence Platform (TIP) goes beyond the traditional offerings, leveraging advanced threat intelligence automation, high-volume IOC ingestion, simplified tool integrations, and endless intel operationalization capabilities for a proactive cyber defense.
This demo will div...
More info Cybercast
Companies, universities, and government agencies are eager to employ AI technologies like ChatGPT and AI Assistants, like Microsoft Copilot, to improve productivity and analytical capabilities. However, AI introduces risks to the organization like data compromise and biased or false outputs. More than ever, CISO leadership is needed to manag...
More info Cybercast
New year. New risks. New priorities.
Your personal resolutions may be defined, but your organization’s risk resolutions might be a bit more ambiguous. Do you start from scratch? Or continue to focus on unresolved issues from 2023?
With continued budget cuts, growing third-party relationships, and disruptive technology (hint. hint. AI), secur...
More info Cybercast
HTTPS is the gold standard for encrypting and protecting data on the web—yet almost 86% of cyberthreats hide in encrypted traffic, too. It’s a double-edged sword: even as encryption protects sensitive data, it’s a key means for threat actors to bypass defenses. With the bulk of malware, ransomware, and phishing attacks hidden in TLS/SSL, how can e...
More info Cybercast
The embrace of SaaS and operating in multi-cloud environments creates an expansive and dynamic attack surface, making it difficult for security teams to maintain visibility into and understand risk levels. And with the protection of sensitive data now a shared responsibility between security teams and providers, CISOs have additional consideration...
More info Cybercast
In this webcast, we dissect the lessons derived from ransomware attacks involving MOVEit, Doubledrive, and the MGM/Caesars breach—to empower organizations in fortifying their cybersecurity defenses.
The session will commence with an in-depth analysis of the MOVEit ransomware attack, unraveling the tactics employed by threat actors to exploit vu...
More info Cybercast
With the potential of cost savings, reduced operational complexities, and speed to market, many organizations are migrating from on-premises and third-party data centers to Cloud computing environments. However, accompanying these “cloud first” strategies are many challenges that include protecting confidential data and operating new securit...
More info Cybercast
With the complexity of modern applications and their reliance on third-party components, protecting our software supply chains is paramount. But without a holistic way to connect and contextualize risks within CI/CD pipelines and source control managers, siloed software supply chain security (SSCS) solutions can end up creating more noise than App...
More info Cybercast
The frequency of data breaches and leaks in 2023 has surpassed cyber incidents from the past five years, highlighting the necessity for strong cybersecurity frameworks. In his discussion, Bart Falzarano, Head of Information Security at Bitwarden, will highlight the critical role of Zero Trust architecture in enhancing Identity Access Management (I...
More info Cybercast
In today’s digital enterprises, identity-centered security is critical to reduce vulnerable attack surfaces, but implementation or rearchitecting efforts can be costly, burdensome to security teams, and create friction for users.
In this panel discussion, CISOs share their IAM implementation and maturation best practices and lessons learned alo...
More info Cybercast
A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their...
More info Cybercast
The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation...
More info Cybercast
In an era dominated by cloud computing, the landscape of network security is undergoing a paradigm shift, presenting both unprecedented challenges and opportunities. Join us for an insightful webcast as we delve into the dynamic realm of network security in the age of cloud computing. We’ll explore the multifaceted aspects of securing networks in ...
More info Cybercast
In application security, recognizing threats is just the beginning. Real success requires choosing the right tools, adopting effective methodologies, and integrating security practices into development gates across the software development lifecycle — from “shift left” early-stage strategies to “shift right” monitoring post...
More info Cybercast
Threat actors never stop working and employing new tools to hold your data hostage and take your business down. Attack vectors are often multifaceted and evasive. And the risk of reinjecting vulnerabilities, compromised accounts, and other attack artifacts back into your environment is a pervasive threat. Compared to previous data exfiltration att...
More info Cybercast
The increased complexity of malicious actors’ techniques demand CISOs stay one step ahead of the threat landscape while still preparing for potential worst-case scenarios. Join this panel discussion to learn the steps CISOs can take to minimize the impact of a ransomware attack.
The discussion explores:
The latest adversarial trends a...
More info Cybercast
Applications and software supply chains are constantly changing. So is the threat landscape.
Vulnerabilities, misconfigurations, exposed secrets, design flaws, sensitive data exposure, etc., will always be inevitable. That’s why application security remains such a vibrant market and why application security teams have a host of tools (SAST, SCA...
More info Cybercast
AppSec has long been considered a subset of IT security, but today’s threats make securing applications an imperative for the entire business. But how do you make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped one client on its journey to eff...
More info Cybercast
Just because a business is mid-sized doesn’t mean the security risks it encounters are any smaller than those experienced by large enterprises. All organizations, regardless of size, face the same challenges around identity growth and management. A growth that places a greater burden on smaller organizations with limited resources that need to rem...
More info Cybercast
The Reckoning is here for Traditional MFA, as it’s not enough for cyber insurance compliance. Did you know that the most popular methods of MFA (like OTP and push to email / text) are easily hacked and are grounds for higher premiums and non-renewals? Everyone knows that MFA provides better protection against hackers than just SSO and 2...
More info