Hi [[ session.user.profile.firstName ]]

The Science of Cybersecurity: Best Practices in the New Normal

As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. As you navigate this new workforce dynamic, how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity” as we discuss best practices organizations can put in place quickly, efficiently, and effectively to protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

-What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
-Why training your employees for cybersecurity resiliency is critical for your business
-Best practices to allow for inoculating your network and remote workers against threats
-How to be prepared and plan for what’s next
Recorded Oct 29 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Theresa Lanowitz, Director, AT&T Cybersecurity and Phil Quade CISO, Fortinet
Presentation preview: The Science of Cybersecurity: Best Practices in the New Normal

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Science of Cybersecurity: Best Practices for Business in Asia Pacific Dec 18 2020 5:00 pm UTC 60 mins
    Theresa Lanowitz Director, AT&T Cybersecurity Phil Quade CISO, Fortinet
    As organizations across Asia Pacific continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity.” We will discuss best practices organizations can put in place to quickly, efficiently, and effectively help protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
    -Why training your employees for cybersecurity resiliency is critical for your business
    -Best practices to help protect your network and remote workers against threats
    -How to be prepared and plan for what’s next
  • The Science of Cybersecurity: A new way of thinking for European Organizations Dec 17 2020 4:00 pm UTC 60 mins
    Director, AT&T Cybersecurity Phil Quade CISO, Fortinet
    As organizations across Europe continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity.” We will discuss best practices organizations can put in place to quickly, efficiently, and effectively help protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations

    -Why training your employees for cybersecurity resiliency is critical for your business

    -Best practices to help protect your network and remote workers against threats

    -How to be prepared and plan for what’s next
  • Building Blocks for a Cyber Resilient 2021 and beyond Dec 10 2020 5:00 pm UTC 57 mins
    Bindu Sundaresan, Director, AT&T Cybersecurity Derrick Johnson, Principle Architect, Cyber Operations, AT&T Cybersecurity
    There is no more business as usual. Rapid and dramatic changes concerning how and where personnel perform their daily responsibilities require companies to provide that their security infrastructure, controls, processes, and plans are updated and operational. 2020 has been a year full of change, and we've gone through digital transformation initiatives in the span of a single year that probably would have taken us many years.

    Join us for a 1-hour webcast as our AT&T Cybersecurity Consulting team discusses steps you can take to help build resilience now, especially when the future feels less than certain. Designed for CIOs, CISOs, and security experts facing new challenges on the front line, topics will cover:

    • Cyber Transformation & Risk Management
    • Cloud Security Architecture and Path to Zero Trust
    • Managing Compliance with a remote workforce
    • Threat and Vulnerability Management and Rapid Response

    The pressure is on to maximize - possibly reduce - your IT/security spend, but you know that cybersecurity is critical. In this webcast, we will cover priorities for 2021 Cybersecurity as you work towards Cyber Resilience.

    Hosts:

    Bindu Sundaresan, Director, AT&T Cybersecurity
    Derrick Johnson, Principle Architect, Cyber Operations, AT&T Cybersecurity
    Carisa Brockman, Principal Architect, Risk Advisory, AT&T Cybersecurity
    Clint Harris, Principle Architect, Cyber as a Service
  • The Science of Cybersecurity: Digital Transformation in Retail Dec 3 2020 5:00 pm UTC 43 mins
    Courtney Radke Fortinet National Retail CISO Theresa Lanowitz Director, AT&T Cybersecurity
    Retail as an industry has been in a transformational mode for the past several years – add a pandemic and consumers wanting to do everything from the safety of their computer screens and the pace of change increases at an unprecedented rate.

    Retail organizations are working closely with cybersecurity professionals to lead with a security-first mindset to help provide that personally identifiable information (PII) is protected, the expanded attack surface with an increase in connected devices is highly secure, and the IT systems supporting the retail business are up to date and managed.

    Join Courtney Radke, Fortinet National Retail CISO and Theresa Lanowitz, AT&T Cybersecurity for an informative 30-minute conversation about the changing face of retail and how to proactively lead digital transformation activities with a security-first mindset to help drive desired business outcomes.

    Courtney and Theresa will discuss:

    How retail is adapting to new demands through use of innovative technologies
    Why IoT is a key enabler for digital transformation and why the expanded attack surface should be proactively managed
    How to lead with a security-first mindset to help deliver desired business outcomes
  • Building Blocks for your 2020 Security Program Recorded: Nov 18 2020 55 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity Bindu Sundaresan, CISSP, CEH, CISM - Directo
    Is one of your New Year's resolutions to reduce your cyber risk in 2020? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast to learn how solutions from AT&T Cybersecurity, can help you to:

    Determine your current security posture and make a prioritized plan for improvement
    Centralize security monitoring across multi-cloud and on-premises environments
    Automate threat detection and incident response activities for improved efficiency
    Consolidate your regulatory compliance requirements to help accelerate audit readiness
    Maintain continuous security monitoring all year long
    Register today to reserve your seat. Here's to a secure 2020!
  • A conversation about leading with a security-first mindset Recorded: Nov 16 2020 34 mins
    Donnie O'Sullivan, CNN and Alicia Dietsch, CMO, AT&T Cybersecurity
    In honor of National Cybersecurity Awareness month, we’re talking about leading with a security-first mindset. Our current global landscape is testing network resiliency. As organizations continue to shift to a remote work business model, the rush to deploy digital and cloud solutions has created new and heightened cyber risk concerns. Protecting these digital connections needs to stay top of mind for leaders looking to help their organizations adapt to these changes while continuing to innovate.

    Join CNN’s Donie O’Sullivan for a conversation with Alicia Dietsch, CMO, AT&T Cybersecurity, as she shares the biggest risks facing organizations today, and considerations for CISOs in adapting to the ever-changing landscape.
  • The Science of Cybersecurity: Best Practices in the New Normal Recorded: Oct 29 2020 58 mins
    Theresa Lanowitz, Director, AT&T Cybersecurity and Phil Quade CISO, Fortinet
    As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. As you navigate this new workforce dynamic, how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity” as we discuss best practices organizations can put in place quickly, efficiently, and effectively to protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
    -Why training your employees for cybersecurity resiliency is critical for your business
    -Best practices to allow for inoculating your network and remote workers against threats
    -How to be prepared and plan for what’s next
  • Preparing for Zero Trust and planning your strategy Recorded: Oct 22 2020 57 mins
    John Kindervag, Field CSO, Palo Alto Networks Bindu Sundaresan, CISSP, CEH, CISM - Director, AT&T Cybersecurity
    Lessons learned with John Kindervag, Steve Sekiguchi, and Bindu Sundaresan

    Organizations globally are embracing Zero Trust (ZT) as a meaningful, strategic approach to security, whether deploying ZT as part of a digital transformation initiative or to better protect an increasingly distributed network and workforce. However, many security leaders continue to struggle with where to start on their ZT journey and how to provide for a successful roll out.

    Join AT&T Cybersecurity for an expert session on how to best prepare and smartly plan for achieving Zero Trust. Don’t miss the opportunity to hear directly from three top ZT strategists and practitioners — including the creator of Zero Trust — as they share insights and lessons learned from their work in the field helping enterprises of all sizes to deploy ZT. In this webinar, you’ll learn:

    -Who to put on your Zero Trust team to help work toward success
    -What essential factors must be considered ahead of time
    -Where to start when assessing your organization’s readiness for Zero Trust
    -Why Zero Trust strategy and planning must happen from the inside out
    -How to avoid common pitfalls when starting (or continuing) your progression to ZT targets

    Hosts:

    John Kindervag, Field CSO, Palo Alto Networks
    Bindu Sundaresan, CISSP, CEH, CISM - Director, AT&T Cybersecurity
    John Kindervag, Field CSO, Palo Alto Networks
    Tawnya Lancaster, Lead Product Marketing Manager, AT&T Cybersecurity
  • What SD-WAN means for your cybersecurity program Recorded: Sep 29 2020 56 mins
    Mary Blackowiak- Lead Product Marketing Manager, Chris Johnson -Technical Product Manager, Greg Mohr- Senior Product Manager
    Software Defined Wide Area Network or SD-WAN is a virtualized approach to networking that elevates network traffic management away from hardware and premises, to next-generation software in the cloud for enhanced agility, centralized control, and visibility. Organizations of all shapes and sizes are taking advantage of SD-WAN in order to modernize their networks, reduce latency, lower costs, and prepare to support future business initiatives.

    But what does it mean for your cybersecurity program?

    Join this webinar to discover:

    Why SD-WAN forces organizations to rethink their cybersecurity architecture
    Solutions to unify protection across office-based and mobile users
    How to navigate the many security products that are available
    You will also have the opportunity to see a live demo from AT&T Cybersecurity managed security services that helps to continuously protect your critical assets as you evolve your network with SD-WAN technologies.
    Register today.
  • How to manage access control with Zero Trust Recorded: Sep 21 2020 64 mins
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism
    A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO)

    Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Access control has always been a part of ZT, however in 2019 Forrester formalized the requirement to “limit and strictly enforce access control” into a core, critical pillar of the framework — of equal importance to network security. Controlling and maintaining access to the business without disrupting operations has reached a new level of importance. Especially now that businesses are dealing with the needs of a sudden, remote workforce and increasingly embrace mobile, cloud, and edge computing.

    Join us in a conversation with the AT&T Chief Security Office (CSO) as we discuss its current point of view on how to manage access control using ZT principals, including best practices. In this webinar, we’ll discuss:

    -What steps you can take to help improve access control and move closer to a ZT environment
    -Why network segmentation and virtualization are so important
    -How to use automation and orchestration for managing and dynamically enforcing access
    -Why you should define security policy by network components (versus IP addresses) and how to extend multi-factor authentication

    Meet Your Hosts:
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Steve Sekiguchi
    Director, Cybersecurity for AT&T Chief Security Office (CSO)
    Rich Bowman
    Lead Member of Technical Staff for CSO
  • How Do You Compare to Peers When It Comes to Cybersecurity Maturity? Recorded: Sep 14 2020 67 mins
    Jon Oltsik
    Join AT&T Cybersecurity and ESG to preview a benchmark survey on the cybersecurity maturity of enterprises in North America. Using the NIST Cybersecurity framework of “identify, protect, detect, respond, and recover,” AT&T and ESG surveyed 500 security professionals in North America to understand how enterprise are scoring when it comes to the maturity of their security programs, processes, and technology. In this webinar, we’ll give a preview to some of the key insights discovered in that survey and where gaps exist, including to what level enterprises:

    Understand cybersecurity risks to systems, people, assets, data, and capabilities
    Have safeguards in place to provide for the delivery of critical services and to mitigate the impact of cybersecurity events
    Can identify the occurrence of a cybersecurity incident
    Are able to quickly contain the impact of a potential cybersecurity incident and recover from it
    Sign up to get a sneak peak of the report we’ll be publishing from this data and learn how to benchmark your organization against your peers.

    Meet Your Hosts:
    Jon Oltsik
    Senior Principal Analyst & ESG Fellow
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Todd Waskelis
    AVP Cybersecurity Consulting, AT&T Cybersecurity
  • How to evolve your web and internet security for SD-WAN, Mobility and Cloud Recorded: Sep 10 2020 55 mins
    Rich Langston Product Marketing Manager, AT&T Cybersecurity and Brandon Benke Product Marketing Manager, AT&T Cybersecurity
    Today, most organizations rely on cloud apps and services to get work done. Yet, protecting access to the cloud and the broader internet is a growing challenge as workers increasingly want access to your cloud assets from branch offices, mobile devices, and other locations not sitting safely behind your network firewall. Doing nothing is not an option, as the cyber threat landscape continues to shift and scale, making every user and device a potential target for an attack.

    Your security controls must transform as your organization adopts cloud, mobility, and SD-WAN technologies. With a cloud-native security gateway solution like AT&T Global Security Gateway, you can quickly improve your security defenses to help protect your users’ cloud and internet access wherever and however they connect.

    Join us for this webcast to learn more about how cloud, mobility, and SD-WAN are disrupting traditional approaches to network security and how AT&T Cybersecurity can help. In this webcast, you’ll learn how:

    • Network and cloud evolution are disrupting our existing security best practices

    • A cloud-native security gateway can help protect access to the cloud and internet

    • AT&T Global Security Gateway can help provide a faster, simpler path to cloud security

    • AT&T Cybersecurity delivers managed security services to help you achieve a virtually seamless security strategy across your cloud, networks, and devices
  • New (and free) analysis tools for the cyber threat hunter Recorded: Sep 3 2020 59 mins
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • How to manage access control with Zero Trust Recorded: Aug 13 2020 64 mins
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism
    A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO)

    Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Access control has always been a part of ZT, however in 2019 Forrester formalized the requirement to “limit and strictly enforce access control” into a core, critical pillar of the framework — of equal importance to network security. Controlling and maintaining access to the business without disrupting operations has reached a new level of importance. Especially now that businesses are dealing with the needs of a sudden, remote workforce and increasingly embrace mobile, cloud, and edge computing.

    Join us in a conversation with the AT&T Chief Security Office (CSO) as we discuss its current point of view on how to manage access control using ZT principals, including best practices. In this webinar, we’ll discuss:

    -What steps you can take to help improve access control and move closer to a ZT environment
    -Why network segmentation and virtualization are so important
    -How to use automation and orchestration for managing and dynamically enforcing access
    -Why you should define security policy by network components (versus IP addresses) and how to extend multi-factor authentication

    Meet Your Hosts:
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Steve Sekiguchi
    Director, Cybersecurity for AT&T Chief Security Office (CSO)
    Rich Bowman
    Lead Member of Technical Staff for CSO
  • How Do You Compare to Peers When It Comes to Cybersecurity Maturity? Recorded: Jul 23 2020 67 mins
    Jon Oltsik
    Join AT&T Cybersecurity and ESG to preview a benchmark survey on the cybersecurity maturity of enterprises in North America. Using the NIST Cybersecurity framework of “identify, protect, detect, respond, and recover,” AT&T and ESG surveyed 500 security professionals in North America to understand how enterprise are scoring when it comes to the maturity of their security programs, processes, and technology. In this webinar, we’ll give a preview to some of the key insights discovered in that survey and where gaps exist, including to what level enterprises:

    -Understand cybersecurity risks to systems, people, assets, data, and capabilities
    -Have safeguards in place to provide for the delivery of critical services and to mitigate the impact of cybersecurity events
    -Can identify the occurrence of a cybersecurity incident
    -Are able to quickly contain the impact of a potential cybersecurity incident and recover from it

    Sign up to get a sneak peak of the report we’ll be publishing from this data and learn how to benchmark your organization against your peers.

    Meet Your Hosts:
    Jon Oltsik
    Senior Principal Analyst & ESG Fellow
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Todd Waskelis
    AVP Cybersecurity Consulting, AT&T Cybersecurity
  • What SD-WAN means for your cybersecurity program Recorded: May 21 2020 56 mins
    Mary Blackowiak Lead Product Marketing Manager, AT&T Cybersecurity Chris Johnson Technical Product Manager
    Software Defined Wide Area Network or SD-WAN is a virtualized approach to networking that elevates network traffic management away from hardware and premises, to next-generation software in the cloud for enhanced agility, centralized control, and visibility. Organizations of all shapes and sizes are taking advantage of SD-WAN in order to modernize their networks, reduce latency, lower costs, and prepare to support future business initiatives.

    But what does it mean for your cybersecurity program?

    Join this webinar to discover:

    Why SD-WAN forces organizations to rethink their cybersecurity architecture
    Solutions to unify protection across office-based and mobile users
    How to navigate the many security products that are available
    You will also have the opportunity to see a live demo from AT&T Cybersecurity managed security services that helps to continuously protect your critical assets as you evolve your network with SD-WAN technologies.

    Register today.
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere Recorded: May 14 2020 55 mins
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Speakers:
    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • Building Blocks for your 2020 Security Program Recorded: Apr 23 2020 55 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity Bindu Sundaresan, CISSP, CEH, CISM - Directo
    Is one of your New Year's resolutions to reduce your cyber risk in 2020? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast to learn how solutions from AT&T Cybersecurity, can help you to:

    Determine your current security posture and make a prioritized plan for improvement
    Centralize security monitoring across multi-cloud and on-premises environments
    Automate threat detection and incident response activities for improved efficiency
    Consolidate your regulatory compliance requirements to help accelerate audit readiness
    Maintain continuous security monitoring all year long
    Register today to reserve your seat. Here's to a secure 2020!
  • 5G is Coming, Are You Prepared? Recorded: Mar 24 2020 53 mins
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism
    5G technologies and networks are bringing exciting new possibilities for the enterprise. Prudent organizations are taking a proactive stance by anticipating the security requirements that will come with the new technology. Given the multifaceted nature of 5G and security, it’s critical for organizations to understand the magnitude of this undertaking.

    Join us to learn key findings revealed in the recently published AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G. This ninth edition of the Insights Report is based on a global survey of enterprise security leadership conducted by AT&T Cybersecurity with 451 Research. Results show that many enterprises are getting a head start on 5G, yet many are challenged with understanding and appreciating all its dimensions.

    In the webinar, we’ll cover:
    • How 5G will transform the network with such things as Multi-edge Computing (MEC) and IoT
    • Where 5G may present new security challenges and where it offers security benefits
    • Which security controls will become most critical in the 5G future
    • What security practitioners should focus on to get a head start on 5G

    Meet your hosts:
    Tawnya Lancaster, Lead Product Marketing Manager
    Theresa Lanowitz, Head of Evangelism
  • How cybersecurity consulting can help you make smart security investments Recorded: Nov 7 2019 60 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity and Bindu Sundaresan, Principal Architect, AT&T Cybersec
    As your organization accelerates towards digital and cloud transformation, your cyber risk and security strategy must transform as well. Yet, it can be a challenge to successfully navigate this security transformation while also contending with constant change in global cyber threats, new security technology and innovation, and the regulatory compliance landscape. That's why every organization can benefit by engaging a trusted cybersecurity consulting provider to help with their cyber risk and security strategy.

    AT&T Cybersecurity consulting has a history of providing expert cybersecurity consulting services to organizations of all sizes across industries and geographies. AT&T Cybersecurity consultants provide expert insights and practical tools that organizations need to establish and maintain security best practices.

    Join us for a special National Cybersecurity Awareness Month webcast to learn how AT&T Cybersecurity consulting can help your organization to maintain or improve your cyber risk and security strategies as your organization transforms and grows. In this session, we'll highlight the AT&T Cybersecurity consulting services that can help even small-to-midsize organizations to accelerate and simplify their security and compliance efforts, including:

    - Cyber risk posture assessments
    - Vulnerability scanning services for PCI DSS
    - Employee cybersecurity awareness training
    - Penetration Testing
    - and many more!
Edge-to-Edge cybersecurity solutions.
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Science of Cybersecurity: Best Practices in the New Normal
  • Live at: Oct 29 2020 4:00 pm
  • Presented by: Theresa Lanowitz, Director, AT&T Cybersecurity and Phil Quade CISO, Fortinet
  • From:
Your email has been sent.
or close