Hackers routinely steal passwords, keys and private certificates in order to break into networks and cloud environments, expand access and deploy malware. Tune in for state-of-the-art information on how you can leverage automation and AI to thwart hackers in real-time and protect your organization.
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Along the way, we’ll provide you with tips for stopping hackers at every stage.
Cybercriminals want to break into your email to steal sensitive data, conduct fraud, or reset passwords for your other accounts. In this webinar on November 9th, we’ll show you how hackers break into your email, fake invoices and wire fraud examples, how to recognize spoofed emails, and the top ways to protect your email account.
Do you hate passwords? You’re not alone. Even the best passwords can be stolen or guessed. Today, multifactor authentication (MFA) is a must—but hackers have honed techniques for bypassing common MFA tools. In this practical presentation, we’ll discuss:
• How hackers bypass authentication
• Critical MFA configuration changes that can thwart hackers
• Password managers – how hackers target them, and you can protect them
• Biometric authentication options, including facial recognition, palm prints and more
• Single-sign-on and other enterprise tools to streamline authentication
• Identity and access management
Learn how you can reduce risk and frustration in this fast-paced talk.
The world has changed—and your cybersecurity budget needs to change with it. Criminals have ramped up attacks on the supply chain and the cloud, while remote work has introduced new weaknesses. How can you maximize your ROI on cybersecurity investments in today’s new landscape? In this fast-paced webinar, we’ll highlight smart areas to prioritize for the coming year.
What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the Black Hat 2022 and DEFCON conferences, including:* New security vulnerabilities in the 5G cellular network
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!
Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place.
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Our webinar shares practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Join us for a series of step-by-step workshops that demonstrate how to deploy multifactor authentication (MFA) for popular services, including Microsoft 365 and G-Suite. In addition, we’ll show you how to set up Duo for an all-encompassing MFA solution that supports SSO and has advanced management capabilities.
Cybersecurity was the top spending priority for CIOs in 2021, according to Gartner. Not all spending is equally effective, however. In this fast-paced talk, we’ll step through the key elements of a highly successful cybersecurity program.
Ransomware is an epidemic. In the blink of an eye, everything from your financial records to emails to file shares have been encrypted, possibly never to be seen again. This is the nightmare that organizations around the world have faced, as they grapple with the most destructive and terrifying of all cyberattacks. Our ransomware training class shows you how to quickly respond and minimize losses.
Cybercriminals are getting busted– but they’re not going away; they are simply shifting tactics. At the same time, there’s been a surge in proactive cybersecurity legislation. In this webinar, we’ll take a deep dive into the latest trends and ways that all organizations can prepare for change.
Cybercriminals are taking hacking to the next level, by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear about the latest cybercriminals tactics, the top threats of the year, and the ways that you can protect your organization in 2022.
‘Tis the season for payment card breaches and holiday scams! In this webinar, we’ll discuss techniques criminals use to steal card numbers, including the latest malware and eCommerce site hacks, and discuss popular security tools and how to protect yourself and your organization from payment card theft.
Cybercriminals want to break into your email, in order to steal sensitive data, conduct fraud, or reset passwords for your other accounts. Learn the top ways to protect your email account and reduce your risk of fraud in this fast-paced seminar.