Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • As recently reported in the WSJ, 1% of users represent 75% of cybersecurity risk. We know, we were surprised too. This and other shocking truths about the causes and consequences of cloud vulnerabilities are uncovered in our latest cybersecurity report - gathered from our findings across over 10 million users, 1 billion cloud assets, and 91,000 unique apps.

    Get the inside scoop in our webinar where you’ll learn what it all means directly from our customer insights and data guru, Ayse Kaya Firat:

    – Top cloud cybersecurity trends that fly under your radar
    – What the distribution of cloud cybersecurity risk means for your ability to act on it
    – Three key security skills you should master for an immediately safer cloud environment
  • Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

    Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

    Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
    -Why they use a layered approach to security and how OpenDNS complements their security stack
    -How long it took to deploy OpenDNS Umbrella globally
    -How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
  • Healthcare privacy and data protection regulations are among the most stringent of any industry. Join this Webcast to learn how healthcare organizations can securely share health data across different cloud services. Hear experts explore how Encrypted Objects and Delegated Access Control Extensions to the Cloud Data Management Interface (CDMI) standard permits objects to freely and securely move between clouds and clients with enhanced security and auditability.
    You’ll learn:
    •Protecting health data from alteration or disclosure
    •How Cloud Encrypted Objects work
    •How Delegated Access Control works
    •CDMI for Electronic Medical Records (EMR) applications
    •Healthcare use cases for implementing securely sharing data in the cloud
  • Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.

    Register for this webcast to learn about:
    •New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
    •How to provide remote access and single sign-on to on-premises web applications with Application Proxy
    •Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service

    Register now to watch live or receive notification when this program is available on-demand.
  • The future for women in Cyber Security is NOW.

    Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.

    At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.

    Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.

    “At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
  • Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.

    Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:

    * Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
    * Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
    * Notifications about breached/exposed credentials.
    * Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
    * Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more.

    Levi Strauss & Co. products are sold in more than 110 countries worldwide through a combination of chain retailers, department stores, online sites, and a global footprint of approximately 2,700 retail stores and shop-in-shops.

    ---

    Harris D. Schwartz is a global security, risk and investigations professional, with over 20 years of private sector experience; experience in the design, development and implementation of comprehensive security, investigations and threat intelligence strategies in a variety of business climates and organization cultures. Schwartz has developed security and risk programs for a variety of business sectors, designing comprehensive threat mitigation solutions, coordination and managing and mentoring of direct reports and multiple departments.
  • Cloud Cybersecurity Lessons From 1B Files and 10M Users

    Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?

    Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.

    Join this webinar to see where your organization stands against your peers and competitors.

Embed in website or blog