Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
Simon Edwards, Dennis Technology Labs; Andy Hayter, ICSA Labs
Antimalware Updates from the Experts: Vendors are adding more and more features to their security products, can you tell us what in your opinion is most important and why? Is it detection rate, performance or number of features in the product?
Antimalware Updates from the Experts: Currently there are over 45 endpoint security competitors in the industry so it might get challenging to choose the right product to secure the network. When deciding about security software, what are the most important attributes that should be looked at for a business? Do you think the attributes are different for an enterprise vs. a SMB?
Historically IT asset management (ITAM) and IT service management (ITSM) have been managed as separate entities with separate teams and unconnected objectives. In reality they are highly dependent upon each other with intersecting processes and shared data. When processes, data and tools are combined, they bring considerable benefits - reflecting that the whole is considerably more effective than the sum of the parts. Ian Aitchison, ITSM&ITAM Product Director will explore the synergies between ITAM and ITSM, and the benefits an organisation can achieve with greater visibility into the assets that make up its business services.
Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
With the widespread use of connected devices, hackers have configured new ways to access your smartphones and laptops, even without you knowing. The Pineapple is a router that stages a fake WIFI access point, compromising the security of any smart device that unknowingly connects to it. During the live webinar, Johan Hybinette, CISO at HOSTING, will be going over the following discussion points:
- The technical makeup of the pineapple router
- How the Pineapple hacks into connected devices
- What personal information is at the most risk
- What you can do to protect yourself from this malicious form of identity theft
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
According to Forrester Research, customer obsession has
created a business environment of continual disruption. And in order to adapt in an environment where change is the new normal, PMO leaders are looking for ways to scale Agile across the enterprise and transform into a value-focused organization.
But scaling Agile to the enterprise requires a significant
shift in the way business is run. Join this webinar with Forrester Analyst, Margo Vistacion, and CA Technologies Director of Agile Management, James Chan, as they discuss best practices for making the transition to Agile and how to levrage a modern, value-based
portfolio management framework.
You will learn:
The changes modern PMOs can take to embrace Agile across the organization and bring
executives on board
How to adopt an Agile framework that is flexible enough to keep pace with your changing
How to transition your focus from project delivery to delivering value
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Packet flow switching for the new threat landscape.
Join our webinar to learn how to advance your security maturity with packet visibility using the the Cyber security Capability Maturity Model (C2M2). We’ll cover deployment case studies that explain how packet flow switches enable you to accelerate your security posture:
•Move from passive security to fail-safe active inline security, without network disruption
•Learn how to apply the model in concert with a packet flow architecture
•Accelerate your security infrastructure and enable smooth pilots and roll out of new security systems
With a strong track record in Education, find out how Snow Software provides a consolidated view of all licenses, enabling staff to use just one interface to manage multiple software vendors, device types and locations across all platforms.
Snow Software is an ideal choice for Education thanks to its multi-platform coverage and automatic software recognition of Software.