Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of HistotechnologyRead more >
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Cybercrime continues to grow as an industry — costing the global economy billions per year. And government agencies in the US have become the leading target, with the number of attacks against public agencies outpacing those of the business sector. Watch this webinar “Cyberespionage: The New Paradigm” to find out:
How common cyberespionage tactics such as SQL injection and spear phishing are used to infiltrate government data and classified information
What enterprises can do to gain awareness of these activities that can inadvertently create a domino effect — impacting commercial and personal data and property
The Software Defined OpenFlow instruction-set breaks the boundaries of what we previously classified as control, management, and application network planes. Lack of structure is not an option if we want a robust infrastructure that scales and extends therefore we examine the new emerging standards-based architecture of FlowMapping overlays. Proven in large-scale complex carrier SDN deployments, FlowMapping is taking advantage of the new found agility in OpenFlow application networking without sacrificing scale, distribution, and interoperability.Read more >
During this short 15 minute webinar we will share the example of how a power utility company went about securing their >500 distributed power substations from cyber-attacksRead more >
During the 3rd part of our digital use case series, we will explains how a large steel factory protects its intellectual property from being stolen through hacks.Read more >
Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.
Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.
Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
During this short 15 minute webinar we will share the example of how one of Europe’s Law enforcement agencies has extended its secure DataDiode solution by integrating Active Directory, allowing for single sign-on capabilities.
The organization had a need to use windows domain credentials to reduce the administrative overhead per user. Learn how you too can benefit from integrating Windows Active Directory with the Fox DataDiode and create a secure environment with minimal admin load.
Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.
In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.
Viewers will learn about:
- Understanding Third Party IT Risk
- Structuring Vendor Risk Management Programs
- Evaluating Vendor Risk
- Ongoing Vendor Monitoring and Communication
The National Security Agency (NSA) are acknowledged world-class experts on encryption technology. Yet, Edward Snowden, a junior consultant working for the Agency, managed to bypass all security to download and steal many gigabytes of highly classified information. This session will examine how it all went wrong for the vaunted NSA and what enterprises can learn about using encryption to protect their own sensitive information.Read more >
Infections are a growing threat to business networks. Symantec recently noted that over a million new malware threats are released every day. This leaves companies searching for solutions to prevent infections before they occur - and identify infections that do happen to infect company devices.
Join Payal Mehrotra, BitSight Product Manager, for this webinar to learn how security programs can leverage the BitSight platform to identify and remediate infections on their network, including spam, botnets and malware. She will give an overview on how BitSight identifies infections and how alerts and forensics can help organizations detect and remediate issues as they occur.
How do organizations assess and manage the security risk by their vendors and suppliers? What kind of programs to organizations have in place to manage risk, and how mature are these programs?
In this webinar, Stephen Boyer, CTO and CoFounder of BitSight and Joyce Chutchian, Senior Managing Editor, IDG Enterprise discuss recent survey data on the maturity of vendor risk management programs. This presentation will provide an in-depth analysis of which methods are being used by organizations in order to mitigate third party risk.
Attendees will also learn:
- Why vendor risk management is becoming a standard business practice
- About the challenges organizations face in building a formalized vendor risk program
- How continuous monitoring solutions and security ratings can help bolster vendor risk management programs
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
A Discussion on Trends and Dell SecureWorks’ New Vulnerability Prioritization Service with Risk I/O
As a valued client of Dell SecureWorks, we are inviting you to a discussion about our Vulnerability Monitoring and Prioritization service.
Vulnerability management is critical to any comprehensive defense strategy, and yet, organizations struggle with prioritizing vulnerabilities for remediation based on real risk to their organization.
Please join Dell SecureWorks’ David Langlands, (Director, Security and Risk Consulting), and Risk I/O’s David French, (Vice President), as they discuss how organizations are currently approaching vulnerability management today and the limitations with how risk associated with vulnerabilities is classified and remediated.
Dell SecureWorks, in collaboration with Risk I/O will paint a vision of how organization’s need to evolve their vulnerability management so that they are better assessing and remediating technical and business risk to their organization.
Presenters will discuss:
•Current state of vulnerability management and where it needs to go
•Intelligence-driven prioritization of vulnerabilities defense
•Visualization of vulnerability risk for effective decision-making
Cybersecurity is now a #1 concern for board members. What should they know? How should it be presented?
Richard Clarke knows. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in the Situation Room and the boardroom.
Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.
On March 22 at 2PM ET, join Richard and Jasper for a discussion of:
- What cybersecurity metrics and measurements are most important for the board
- Methods for security leaders to communicate security issues across the enterprise
- How to graphically represent your cybersecurity program
The Higher Education sector is a large target for cyberattacks because of their research in science and technology that can be leveraged for commercial gain. However, colleges and universities often have unique requirements and specific challenges to securing their networks.
In this webcast Stephen Boyer, of BitSight Technologies and Chris Schreiber of University of Arizona discuss:
- The specific challenges that universities and colleges face in mitigating cyber risk
- How threats like peer to peer file sharing present greater risk to this sector
- How universities can use BitSight Security Ratings to mitigate cyber risk and improve their security posture