Webinar Replay – Next-Generation Security: Containers

By | |Webinars, Security and Risk Management|

Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development. But are they taking the right steps to secure those containers? This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in [...]

Webinar Replay – Taking an Operational Approach to Next-Generation Security

By | |Webinars, Security and Risk Management|

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets wherever they reside: on prem, in the cloud, or [...]

Super Micro Spy Chip Hack: How Real?

By | October 6th, 2018|Blog, Security and Risk Management|

The Supermicro chip Source: Bloomberg Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use, it's [...]

Webinar Replay – Next-Generation Cybersecurity Architecture

By | |Free Report, Webinars, Security and Risk Management|

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should be part of it. (View below...)

Webinar Replay – Cybersecurity Maturity: How Does Your Financial Firm Stack Up?

By | |Free Report, Webinars, Security and Risk Management|

Like most cybersecurity professionals, you probably think you do a pretty good job. But how good? After viewing this Webinar, you won't need to ask. We share a clear framework and interactive self-assessment that enables you to quickly and accurately score the maturity of your cybersecurity initiative--and compare yourself to other financial services firms. We [...]

Wall Street Technology Association: Next-Generation Cybersecurity – Implementing Effective Cybersecurity in a Time of Accelerating Threats

By | July 17th, 2018|

It’s no secret that cybersecurity is a growing headache for Wall Street firms. Even with world-class talent, state-of-the-art automation, and best practices, attackers find a way in. And in fact, the attackers may already be inside, infecting endpoints, workloads, services and physical devices that are operating below the radar of conventional security operations. This seminar [...]

Webinar Replay – Building a Risk-Based Business Case for Cybersecurity

By | |Free Report, Webinars, Security and Risk Management|

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives [...]

Webinar Replay – Top Five Myths About Securing IoT

By | |Free Report, Webinars, Security and Risk Management, Internet of Things (IoT)|

Securing IoT isn't exactly like securing any other aspect of your infrastructure--but neither is it entirely different. Most companies, even leading-edge ones, are just beginning to figure this out, and are still struggling with putting in place an IoT security architecture, best practices, and framework. This webinar separates the myths from the realities of securing [...]

Webinar Replay – Crafting An Analytics-Based InfoSec Strategy

By | |Free Report, Webinars|

Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity. During this webinar we: Showcase the battle-tested strategies of the most successful information security organizations Survey the landscape of analytics-based security tools and solutions Walk through how to build a strategy based around current (and future) analytics and automation technologies Spotlight the critical security [...]

Webinar Replay – The Next-Generation Security Architecture: Zero-Trust and Defense-in-Depth

By | |Free Report, Webinars|

What is the Zero Trust security model and what should it mean to you? Learn about how leading-edge companies like Google and Amazon have re-invented cybersecurity, and in the process upended our most cherished beliefs about the roles of network access control (NAC), next-generation firewalls (NGFW) and more. You'll come away from this webinar with [...]