Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of HistotechnologyRead more >
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Cybercrime continues to grow as an industry — costing the global economy billions per year. And government agencies in the US have become the leading target, with the number of attacks against public agencies outpacing those of the business sector. Watch this webinar “Cyberespionage: The New Paradigm” to find out:
How common cyberespionage tactics such as SQL injection and spear phishing are used to infiltrate government data and classified information
What enterprises can do to gain awareness of these activities that can inadvertently create a domino effect — impacting commercial and personal data and property
The Software Defined OpenFlow instruction-set breaks the boundaries of what we previously classified as control, management, and application network planes. Lack of structure is not an option if we want a robust infrastructure that scales and extends therefore we examine the new emerging standards-based architecture of FlowMapping overlays. Proven in large-scale complex carrier SDN deployments, FlowMapping is taking advantage of the new found agility in OpenFlow application networking without sacrificing scale, distribution, and interoperability.Read more >
The final webinar of this series will outline how an Oil company needed to protect their core Control Center and prepare to comply with mandatory national safety regulations. Discussion points include OT and IT segregation, Cyber-Attack prevention and ability to send information and data to HQ.Read more >
This webinar will give insight in our solution to guarantee reliable and secure communications for those organizations that have remote locations or use mobile deployment. We will explain how SkyTale combines authentication, encryption, provides assured connectivity for a diversity of IP devices.Read more >
During the 3rd part of our digital use case series, we will explains how a large steel factory protects its intellectual property from being stolen through hacks.Read more >
For this webinar we will focus on the challenges a Nuclear Power plant faced, as by law they are required to protect core nuclear assets against cyber-attacks at the same time having to comply with national safety regulations. We will discuss OT and IT segregation and explain how we were able to offer 100% HA the highest level of assurance.Read more >
Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?
Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
During this short 15 minute webinar we will share the example of how a power utility company went about securing their >500 distributed power substations from cyber-attacksRead more >
In 2015, large-scale data breaches have hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which 177,866,236 records were compromised. While no industry is immune to data breaches, some are more prepared than others.
In this webinar, Jay Jacobs, Senior Data Scientist at BitSight explains how security posture differs in the following industries: Finance, Retail, Energy and Utilities, Healthcare, Education, and Federal Government. This webinar will highlight new findings on:
- The types of vulnerable services running on corporate networks
- The percentage of companies using the latest certificates to implement HTTPS, and whether companies are implementing these certificates correctly
- How frequently industries tend to remediate vulnerabilities on their networks
- The aggregate BitSight Security Rating for each industry
With so many moving parts pushing an organization forward, companies today must know who has access to their data—making vendor risk management (VRM) a critical business practice. Unfortunately, not all organizations have the resources to staff full-time vendor risk managers. Security professionals now must wear multiple hats in order to reduce operating risk for their organizations. Even if vendor risk management isn’t a primary focus, there are techniques and tools security professionals can implement to make it an efficient and valuable process for your company.
In this webinar, join Andrew Calo, Manager of Technology Risk at BitSight as he offers tips and techniques to efficiently manage and assess vendor risk. Attendees will learn about:
-Basic questions you need to ask all vendors
-The top risk vectors and configurations to look at it
-The value and impact of continuous risk monitoring software
With so many different cyber risk metrics being used, how can cyber insurance underwriters and risk managers know how likely a company is to experience a data breach?
Join Ira Scharf, GM of Worldwide Insurance at BitSight, and Dave Bradford President, Research and Editorial at Advisen as they discuss new correlations between BitSight Security Ratings and data breaches.
Attendees will learn:
- Why security ratings are a clear indicator of cyber risk
- How likely companies with BitSight ratings of 400 or below are to experience a data breach
- How underwriters, policyholders, and applicants can use BitSight Security Ratings to lower their cyber risk
Many recent breaches have exploited security weaknesses in third party vendors and suppliers to attack business and government agencies. In this webinar, the Deputy CISO at Fannie Mae details his experience using BitSight Security Ratings to assess the cybersecurity level of third party business partners and vendors, as well as using BitSight for ongoing monitoring of externally visible signs of lapses in security levels. This presentation will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the business value gained by a repeatable and ongoing approach for monitoring third party security levels.Read more >
How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?
In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.
Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.
Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
How do some of the most prominent nations in the international economy differ in cybersecurity performance? As organizations increasingly open offices abroad, their networks face global security threats.
In its latest research report, BitSight studied the security performance of companies with more than 50% of their IP space in the following countries: The United States, United Kingdom, Germany, Brazil, China, and Singapore.
Join Stephen Boyer, CTO and CoFounder of BitSight as he takes a deep dive into the threat landscape that organizations face in each of these nations.
Viewers will learn:
● Why companies in some nations tend to be more or less secure than others
● How global companies deal with threats such as botnet infections, SSL attacks, and Spam propagation.
● What businesses with a large global presence can do to mitigate cyber risk across their ecosystem.
In recent years, organizations’ dependency on cloud service providers, web hosting platforms, and other cloud services has increased. Many companies now rely on cloud technologies for critical services, making them vulnerable to single points of failure in their supply chains. A data breach originating from a service provider may affect multiple organizations across different industries. Many of your company’s vendors may rely on certain cloud service providers. What risk does this pose to your organization?
In this webinar, Matt Cherian, Director of Product Management & Customer Operations at BitSight will discuss:
- Why organizations need to identify and monitor fourth party connections as64 they transition to the public cloud and digital systems
- Which industries could be most impacted by service provider outages and which of these industries rely on obsolete software
- How BitSight Discover can help enterprises mitigate operational and cyber risk