Cybercriminals want to break into your email, in order to steal sensitive data, conduct fraud, or reset passwords for your other accounts. Learn the top ways to protect your email account and reduce your risk of fraud in this fast-paced seminar.
Do you hate passwords? Have trouble remembering them? You’re not alone, but the good news is that today’s technology provides you with options for successfully managing passwords. Learn how you can reduce fraud and frustration in this fast-paced talk.
The world has changed—and your cybersecurity budget needs to change with it. In this fast-paced webinar, we’ll highlight smart areas to prioritize for the coming year.
What are the hottest issues in cybersecurity right now? In this webinar, we’ll discuss new exploits and cutting-edge security research from the Black Hat 2021 and DEFCON conferences.
In this fast-paced webinar, seasoned ransomware experts share their techniques for effectively containing and eradicating the adversary. Join us and learn the critical steps you can take to keep a minor incident from becoming a major catastrophe.
Cybercriminals routinely hack systems and then lurk for weeks or months, but proper monitoring and logging can help you to detect these intrusions early on. Join our webinar and learn practical strategies that can help you reduce your risk and detect minor incidents before they become major catastrophes.
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Join this webinar to get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
“How a security program is planned, executed, and governed is likely as important as how much money is devoted to cybersecurity,” wrote Deloitte in a 2020 analysis. In this fast-paced talk, we’ll step through the key elements of a highly successful cybersecurity program.
Ransomware is an epidemic. In the blink of an eye, everything from your financial records to emails to file shares have been encrypted, possibly never to be seen again. This is the nightmare that organizations around the world have faced, as they grapple with the most destructive and terrifying of all cyberattacks. Our ransomware training class shows you how to quickly respond and minimize losses.
Criminals everywhere use malware to infect your computers, steal your files, capture passwords and transfer funds. See it in action and get tips and tricks for preventing and detecting modern malware in this fast-paced webinar.
What makes the dark web so dark? In this talk, we’ll show you how the dark web works, explore extortion sites where criminal gangs publish stolen data, and show you screenshots of darknet markets where criminals peddle hacking tools, stolen personal info and more.
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp.
Encryption is a powerful security tool that can protect confidential data, stop hackers from breaking in, and verify the identity of remote users. But how does this mysterious technology work?
Cybercriminals are taking hacking to the next level, by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear about the latest cybercriminals tactics, including supply-chain hacks, new phishing tactics, and cloud hacking.
‘Tis the season for payment card breaches and holiday scams! As the end of the year approaches, criminals are working overtime to take advantage of busy employees, trusting consumers, and vulnerable payment processing systems. In this webinar, we’ll discuss techniques criminals use to steal card numbers, including the latest information-stealing malware and eCommerce site hacks.
Do you hate passwords? Have trouble remembering them? You’re not alone. The good news is that today’s technology provides you with options for successfully managing passwords.
There are a zillion ways for criminals to break into your networks and your physical space, and defending against today’s threats can seem overwhelming. However, there are simple steps you can take to break down seemingly complex cybersecurity problems and conquer them.