UPCOMING “LIVE” WEBINARS:
Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.
ATTIVO NETWORKS – COMING SOON…
ENTRUST – COMING SOON…
EXTERRO – ACCESS DATA – COMING SOON…
MOST RECENT WEBINARS ON REPLAY:
The Smart Approach to Building Comprehensive Cybersecurity Without Security Staff
Evolved cyber threats aren’t targeting just large enterprise businesses. The challenge is, organizations with limited security resources and staff can’t manage a complicated (and often expensive) cybersecurity program. So how do you build comprehensive cybersecurity plans, policies, procedures, education, training, scanning, remediation, and more across your entire organization?
Join 20+ year security veteran, and Co-Founder of Defendify, Rob Simopoulos, who explains how a 24/7 cybersecurity program can be streamlined across people, process, and technology, without needing multiple complex tools or specialized security professionals on staff.
In this presentation you will learn smart steps to implement:
- A cyber-solid foundation of plans, policies, and procedures.
- A cyber-smart company culture of training and institutional knowledge.
- Cyber-strong technology that goes beyond traditional anti-virus and firewalls.
Rob Simopoulos | Co-Founder | Defendify
With more than 20 years of security experience, Rob is a frequent speaker and thought leader across security groups and publications. As Co-Founder of Defendify, Rob helped introduce the award-winning cybersecurity platform for small and mid-sized businesses that is trusted by thousands of users across the globe.
PKI-as-a-Service: Improve Security While Reducing Cost
In this webinar, we explore public key infrastructure as a service (PKIaaS) and how this time-tested solution will provide organizations with a secure, certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment while enhancing performance.
Learn how to unlock the full potential of this security solution, coupling it with endpoint automation to increase coverage, reduce human error and cost, and address today’s evolving landscape of remote employees.
In this webinar, you will:
- Learn how PKIaaS can increase security while reducing complexity and costs
- Get a roadmap for automating a certificate-based security strategy
- Gain access to a checklist for choosing the best PKIaaS provider for your business
About The Speaker: Mrugesh Chandarana is a Senior Product Manager, Identity and Access Management Solutions at HID Global, where he focuses on IoT and PKI solutions. He has more than 10 years of cyber security industry experience in areas such as Risk Management, Threat and Vulnerability Management, Application Security and PKI. He has held product management positions at RiskSense, WhiteHat Security (acquired by NTT Security), and RiskVision (acquired by Resolver, Inc.).
Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.
Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation
Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait. This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!
- Developing a comprehensive, defense-in-depth plan
- Technical controls all organizations should consider
- Gotchas to watch out for with cybersecurity insurance
- Benefits of implementing new-school security awareness training
- Best practices for creating and implementing security policies
About the Speaker:
Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 12 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.
Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.
Learn the Secrets of Unified Endpoint Management (UEM) to Boost End User Productivity
January 7, 2021 2-3pm EDT
* Uncover the best-practices holistic view of UEM that most IT folks don’t know
* Discover how to deal with user challenges including priviliged management
* Find out why mobile device management doesn’t have to be your biggest headache
and much more…presented by Jason Morano of Quest Software, hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine.
About the Speaker
Jason Morano is a Senior KACE Presales Engineer at Quest Software, and a subject matter expert for endpoint and user security. He has a 20+ year career starting in IT support, then finishing his commercial IT career working as a security analyst in the banking industry. He has been advising Quest customers for 8 years in securing their endpoint and user environment using industry best practices. Currently residing in South Florida, and former Long Islander with a passion for anything technical.
Join us November 19, 2020 at 2pm EDT for an incredible, content rich webinar.
Sophisticated automated attacks and fraud actors are severely impacting applications, creating a heyday for cybercriminals to exploit stolen data and credentials for account takeover attacks. And like enterprises, bad actors are using automation to work faster and more efficiently. Today’s sophisticated attacks originates from infected consumer devices and mimics human behavior, flying under the radar of anomaly based detection methods.
The top 5 automated attack vectors that you need to protect your company from include:
• New Account Fraud
• Account Takeover
• Inventory Sniping
• Transaction Fraud
• Review Fraud
Dr. Russell Handorf, Principal Threat Intelligence Hacker, White Ops.
BIO: Dr. Russell Handorf works for White Ops as a Principal Threat Intelligence Hacker where he develops technology to detect and deter advanced botnets. He recently worked at the Federal Bureau of Investigation in Cyber Division’s Technical Operations Unit as a computer scientist where he developed and implemented technology that aided in the investigations of criminal and national security matters, served in and helped lead the Cyber Action Team in investigating some of the most critical investigative matters the FBI was pursuing at the time.
Frank Walsh, VP Solutions Engineering, White Ops
BIO: Frank Walsh brings extensive cyber technical leadership experience to his role as Vice President of Solutions Engineering. He manages the White Ops Global Sales Engineering Team and all enterprise security integration efforts connected to the White Ops platform. Frank’s experience spans leadership and development roles in design, integration and launch of cutting edge technology solutions used by millions of end-users across the globe.
Hosted by Gary S. Miliefsky, CISSP and Publisher of Cyber Defense Magazine.
The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.
In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.
Roger will show you:
• How detailed data is harvested using public databases and surprising techniques
• Tricks used to craft a compelling social engineering attack that your users WILL click
• Cunning ways hackers deliver malicious code to take control of an endpoint
• Taking over your domain controller and subsequently your entire network
But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it’s too late. Hosted by the Publisher of Cyber Defense Magazine, Gary S. Miliefsky, CISSP.
Connected, Complex & Converging: New Data on the Challenges Facing IT & OT Security in Manufacturing
The rise of Industry 4.0 and the growth of ‘smart factories’ are poised to deliver significant automation and financial benefits to manufacturers. However, as information technology (IT), operational technology (OT), and intellectual property (IP) converge, new security challenges come into focus. Do today’s Manufacturing cybersecurity teams feel prepared to address the complexity these changes have created, particularly when it comes to threat detection and response? And are they embracing technologies that could help them overcome the limits of traditional security controls and ‘level the playing field’? These are just some of the questions explored in a new survey report from ESG and TrapX Security.
In this live webinar, we’ll debut the results and hear what more than 150 security executives in all sectors of manufacturing had to say about:
- The vulnerabilities within their current IT & OT infrastructure, and the persistent menace of cyberattacks
- Why OT-specific security has become more difficult, and the impact on staff resources
- The need to simplify security operations, and key areas for improvement
- Their understanding of Deception, and its role in improving threat detection and response processes
Senior Principal Analyst & Fellow, ESG
SVP, Strategy & Growth
Gary S. Miliefsky, CISSP®
Publisher, Cyber Defense Magazine
Every year consists of constant change and 2020 is no exception. There is the constant change in the threat landscape, change in IT environments, and change in the form of new technologies and vendors which leads to confusion and complexity. The reality is no level of investment prevents or blocks 100% of attacks. Therefore, organizations must continuously identify and address breaches before they cause real damage but they are typically hampered with either limited budget and/or expertise.
Join Antonio Sanchez from Alert Logic as he discusses Managed Detection and Response (MDR). This new approach is gaining rapid traction for being able to achieve enterprise-class security while simplifying operations. Topics discussed during this session include:
• Understanding MDR
• Aligning to the NIST framework
• Seven Secrets (Must-Have’s) of MDR
Hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine.
Antonio Sanchez serves as Senior Product Marketing Manager at Alert Logic. He has over 20 years in the IT industry focusing on cyber security, information management, and disaster recovery solutions to help organizations of all sizes manage threats and improve their security posture. Antonio is a Certified Information Systems Security Professional (CISSP) and has held various leadership roles at Symantec, Forcepoint, and Dell.
ABOUT THE SPEAKER
Janine Darling, Founder & CEO, STASH Global. Janine is a Top 100 Women in Cybersecurity award winning CXO and Technical Strategist who has held prominent leadership roles for commercial product and service companies of multiple genres. Read more about her at: https://stash.global/ and her LinkedIn profile page, found here: https://www.linkedin.com/in/janinedarling1/
This presentation will walk attendees down the path of ‘where did we come from, how did we get here, and where are we going’ regarding what until now has been the inexplicably unsolvable data privacy and security scourge plaguing the world. Through the use of a slide presentation containing graphics, statistics, general knowledge, and surprises, those attending will walk away with a more keen usable set of data points that can be utilized with confidence, as they assess their own data management risks and requirements particularly as they apply to their specific cybersecurity challenges.
Cybersecurity has become one of the most confounding and also profitable manifestations of modern life for attackers and defenders alike. The mission to eradicate data vulnerability and compromise has been taken up by thousands of big-name technology brands and emerging technology companies. The cyber echo chamber buzzes with exciting concepts: “zero trust”, “AI”, “machine learning”, “quantum computing”, “blockchain”. Yet to date, there have been 185M+ reported data breaches. What’s going on? Find out. This presentation will dive into creating a clearer picture of the difference between cybersecurity tools and actual solutions, what’s preventing ‘mission accomplished’ as it applies to data security, and what you can do about it. The outcome? Knowing how to more confidently prepare for and make the correct decisions on what to protect, why, and how in your organization.
Join our award winning speaker, Janine Darling and our Host, Gary Miliefsky, Publisher of Cyber Defense Magazine for this powerful, educational webinar.
Join our Keynote Speaker, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist and myself, Gary Miliefsky, Publisher of Cyber Defense Magazine for an incredibly enjoyable and informative session.
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join Roger Grimes as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat – a (pre-recorded) hacking demo by Kevin Mitnick.
You will learn:
- How silent malware launches, remote password hash capture, and how rogue rules work
- Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
- Details behind clickjacking and web beacons
- Actionable steps on how to defend against them all If all you were worried about were phishing attempts, think again!
About our Keynote Speaker
Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.
Tony Cole, CTO of Attivo Networks presented a new approach to endpoint security…
Now That Ransomware Has Gone Nuclear, How Can Your Organization Avoid Becoming the Next Victim?
The Future of Work Has Arrived. Learn about Desktop as a Service (DaaS) from Industry Leading Experts.
Game Changing Breach Defense by Dramatically Improving Endpoint Security
Are you an INFOSEC expert who has a story to tell? Do you have a product or solution that might help our readers (CIOs, CISOs, VPs of IT, IT execs, IT admins, SOC administrators, etc.) get one step ahead of the next threat? Let us know and we’ll see if we can get you on our schedule. These are exclusive webinars, hand picked each month and we’re only doing two per month so they are of the utmost value to our readership. Email us at email@example.com to learn more.
Gary S. Miliefsky is the publisher of Cyber Defense Magazine, a cybersecurity expert, keynote speaker, investor and entrepreneur. He loves to seek out the best and brightest speakers to discuss all things cybersecurity.