Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of HistotechnologyRead more >
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
The Software Defined OpenFlow instruction-set breaks the boundaries of what we previously classified as control, management, and application network planes. Lack of structure is not an option if we want a robust infrastructure that scales and extends therefore we examine the new emerging standards-based architecture of FlowMapping overlays. Proven in large-scale complex carrier SDN deployments, FlowMapping is taking advantage of the new found agility in OpenFlow application networking without sacrificing scale, distribution, and interoperability.Read more >
Cybercrime continues to grow as an industry — costing the global economy billions per year. And government agencies in the US have become the leading target, with the number of attacks against public agencies outpacing those of the business sector. Watch this webinar “Cyberespionage: The New Paradigm” to find out:
How common cyberespionage tactics such as SQL injection and spear phishing are used to infiltrate government data and classified information
What enterprises can do to gain awareness of these activities that can inadvertently create a domino effect — impacting commercial and personal data and property
During the 3rd part of our digital use case series, we will explains how a large steel factory protects its intellectual property from being stolen through hacks.Read more >
During this short 15 minute webinar we will share the example of how a power utility company went about securing their >500 distributed power substations from cyber-attacksRead more >
This webinar will give insight in our solution to guarantee reliable and secure communications for those organizations that have remote locations or use mobile deployment. We will explain how SkyTale combines authentication, encryption, provides assured connectivity for a diversity of IP devices.Read more >
For this webinar we will focus on the challenges a Nuclear Power plant faced, as by law they are required to protect core nuclear assets against cyber-attacks at the same time having to comply with national safety regulations. We will discuss OT and IT segregation and explain how we were able to offer 100% HA the highest level of assurance.Read more >
The final webinar of this series will outline how an Oil company needed to protect their core Control Center and prepare to comply with mandatory national safety regulations. Discussion points include OT and IT segregation, Cyber-Attack prevention and ability to send information and data to HQ.Read more >
Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.
Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.
Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
Many recent breaches have exploited security weaknesses in third party vendors and suppliers to attack business and government agencies. In this webinar, the Deputy CISO at Fannie Mae details his experience using BitSight Security Ratings to assess the cybersecurity level of third party business partners and vendors, as well as using BitSight for ongoing monitoring of externally visible signs of lapses in security levels. This presentation will contain a discussion of lessons learned and best practices as well as detail the metrics used to demonstrate the business value gained by a repeatable and ongoing approach for monitoring third party security levels.Read more >
Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.
In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.
Viewers will learn about:
- Understanding Third Party IT Risk
- Structuring Vendor Risk Management Programs
- Evaluating Vendor Risk
- Ongoing Vendor Monitoring and Communication
During this short 15 minute webinar we will share the example of how one of Europe’s Law enforcement agencies has extended its secure DataDiode solution by integrating Active Directory, allowing for single sign-on capabilities.
The organization had a need to use windows domain credentials to reduce the administrative overhead per user. Learn how you too can benefit from integrating Windows Active Directory with the Fox DataDiode and create a secure environment with minimal admin load.
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
How do organizations assess and manage the security risk by their vendors and suppliers? What kind of programs to organizations have in place to manage risk, and how mature are these programs?
In this webinar, Stephen Boyer, CTO and CoFounder of BitSight and Joyce Chutchian, Senior Managing Editor, IDG Enterprise discuss recent survey data on the maturity of vendor risk management programs. This presentation will provide an in-depth analysis of which methods are being used by organizations in order to mitigate third party risk.
Attendees will also learn:
- Why vendor risk management is becoming a standard business practice
- About the challenges organizations face in building a formalized vendor risk program
- How continuous monitoring solutions and security ratings can help bolster vendor risk management programs
A Discussion on Trends and Dell SecureWorks’ New Vulnerability Prioritization Service with Risk I/O
As a valued client of Dell SecureWorks, we are inviting you to a discussion about our Vulnerability Monitoring and Prioritization service.
Vulnerability management is critical to any comprehensive defense strategy, and yet, organizations struggle with prioritizing vulnerabilities for remediation based on real risk to their organization.
Please join Dell SecureWorks’ David Langlands, (Director, Security and Risk Consulting), and Risk I/O’s David French, (Vice President), as they discuss how organizations are currently approaching vulnerability management today and the limitations with how risk associated with vulnerabilities is classified and remediated.
Dell SecureWorks, in collaboration with Risk I/O will paint a vision of how organization’s need to evolve their vulnerability management so that they are better assessing and remediating technical and business risk to their organization.
Presenters will discuss:
•Current state of vulnerability management and where it needs to go
•Intelligence-driven prioritization of vulnerabilities defense
•Visualization of vulnerability risk for effective decision-making
The National Security Agency (NSA) are acknowledged world-class experts on encryption technology. Yet, Edward Snowden, a junior consultant working for the Agency, managed to bypass all security to download and steal many gigabytes of highly classified information. This session will examine how it all went wrong for the vaunted NSA and what enterprises can learn about using encryption to protect their own sensitive information.Read more >