Webinars

Building a Cybersecurity Architecture to Combat Today’s Risks

— Date: 25th Oct, 2017     Time: 10:30 am,     Host:
About This Webinar: "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. We'll help you rethink IT security from a strategic, architectural perspective and outline ways to build a comprehensive set of defenses that can discourage and repel attackers.     When you attend this webinar, you will:
  • Develop a security architecture framework
  • Align IT security with business strategy
  • Adapt architecture to different environments, like on-premises, cloud and hybrid cloud environments
..

Using machines to combat criminals

— Date: 25th May, 2017     Time: 01:00 am,     Host: Roland
About this webinar 2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits. Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm...

Remains a Primary Ransomware Vector

— Date: 22th May, 2017     Time: 22:00 pm,     Host:

About this webinar

Ransomware attacks are globally pervasive, and only getting worse for retailers, hospitals and a number of other businesses. The number of strains of Ransomware is infinite, with more and more advanced versions coming to light every day, but the vectors through which attacks occur remain the same. 90% of malware is delivered via web and email, with dynamic web content dramatically increasing the risk to users. Of the top 50 most visited US sites in 2016, 42% were found to be running vulnerable versions of web-software code. Traditional approaches to cyber security are failing – distinguishing the good from the bad is no longer a reliable option and has a very costly impact on enterprises. One approach that has been developed to tackle the constantly evolving threat landscape is Isolation, which assumes that all active content poses a risk. Greg Maudsley, Senior Director, Product Marketing at Menlo Security will highlight the steps that must be taken to raise awareness of the reality of the Ransomware threat, and discuss the best ways in which to tackle this.
..
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register