Recent Webinars


November 17, 2016 4:00pm EST

There’s no such thing as bad publicity? In the era of data breaches, that’s not really true. Time and again…

November 16, 2016 3:00pm EST

Employee accounts are being constantly targeted by black hat teams. Owning the keys to the kingdom leads to large payoffs….

November 16, 2016 9:30am EST

Build an Active Application Defense System Web applications accounted for an astounding 40% of last year’s security breaches. The challenges…

November 15, 2016 3:00pm EST

Incidents occur, whether malicious or accidental. The need to secure your most sensitive data during an incident is not something…

November 15, 2016 2:00pm EST

Learn the distinct functional areas that every Security Operations Center should have. These areas allow organizations to create an architecture…

November 15, 2016 12:00pm EST

Go beyond the basics of incident response. In this webinar, Sam will discuss the ins and outs of executing an…

November 15, 2016 11:00am EST

Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research,…

November 10, 2016 2:00pm EST

Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation….

November 10, 2016 2:00pm EST

Gone are the days when IAM stood for SSO, centralized policy management and automated user provisioning. In a world full…

November 10, 2016 11:00am EST

Join this presentation and discover the latest developments in artificial intelligence. Dr. David, CTO of Deep Instinct, will explain deep…

November 10, 2016 9:00am EST

A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals…


November 9, 2016 2:00pm EST

Rasomware is spreading at record pace in 2016 as cybercriminals are actively using it to hold businesses, institutions and even…

November 9, 2016 2:00pm EST

With cyber attacks on the rise and high-profile breaches becoming the new normal, being on top of the current trends…

November 9, 2016 1:00pm EST

As companies move to Office 365, Google Drive, Box, ShareFile, Egnyte, Dropbox or Amazon for file sharing, CISOs need to…

November 9, 2016 1:00pm EST

If your company collects data of any kind, it’s guaranteed that there is someone out there who will find it…

November 9, 2016 11:00am EST

In your eco-systems with apps across numerous platforms, and where you possibly are fielding millions of IoT devices, preventing mistrust,…

November 9, 2016 10:00am EST

Michael Biederer, Signalhorn’s VP Operations, explains the proactive monitoring approach of Signalhorn. Signalhorn’s Secure-NOC has been operating with the proactive…

November 9, 2016 9:00am EST

Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning…

November 9, 2016 9:00am EST

When the majority of people think about data protection, they often focus on encryption. Whether the data is at rest,…

November 9, 2016 6:00am EST

The adoption of SaaS is accelerating faster than expected. However, as this SaaS adoption accelerates, enterprises are discovering various legal…

November 8, 2016 2:00pm EST

This talk provides a look into the fatigue that we’ve observed in operating and managing security operations teams. We look…

November 8, 2016 12:00pm EST

Learn how to use threat intelligence to shorten investigation time and improve security decision making. From the right content to…

November 8, 2016 12:00pm EST

Cloud applications offer strategic advantages to organizations, lines-of-business, and users to work more efficiently and more collaboratively but these cloud…

November 8, 2016 12:00pm EST

The need to detect data security blind spots is becoming more important every day. This includes sensitive data that was…

November 8, 2016 11:00am EST

Nivdort is a malware family that has been around for several years. Over these years it has been subject to…

November 8, 2016 9:00am EST

Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats….

November 8, 2016 7:00am EST

The purpose of this webinar is to provide a deep insight into the concerns of cyber defence for small and…

November 8, 2016 5:00am EST

Initiating a breach investigation can be daunting without the right approach or the right tools. Where to begin?! Join Stuart…

November 2, 2016 3:30pm EDT

“Incident post-mortems are an invaluable part of the IT/ops toolkit. Teams recognize the value in learning from past incidents to…

Summit Sponsors

Related Summits

See all

December 11, 2018

Analytics has become more and more prevalent in every aspect of business and with that comes adoption of and innovation…

December 10, 2018

Disruptive cyber attacks are on the rise and all industries are at risk. Enterprises and small businesses are scrambling to…

December 4, 2018

IT infrastructure is mission-critical to the success of the enterprise. Yet CIOs are struggling to improve the productivity of both…