Cybersecurity Webinars

Search for upcoming webinars for Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by PKWARE for Automating Data Discovery and Protection: Streamlining Compliance in an Evolving Regulatory Landscape
Automating Data Discovery and Protection: Streamlining Compliance in an Evolving Regulatory Landscape
In today’s rapidly changing data security ecosystem, organizations face increasing challenges in maintaining data and regulatory compliance without disrupting their user’s day. This webinar explores how automating data discovery and purpose-built security, that follows your policies, can revolutionize compliance efforts, making them more efficient and effective.Key topics covered:• Evolution of compliance requirements and emerging global standards.• Automated data discovery techniques across cloud, on-premises, and hybrid environments.• Machine learning and AI in data classification and policy enforcement.• Balancing automation with human oversight in compliance processes.• Challenges and solutions in multi-regulatory compliance.• Future-proofing your compliance strategy in a changing regulatory landscape.This webinar will provide insights into how organizations can leverage automation to transform their approach to data protection and compliance, saving time and resources while improving their security posture in an increasingly regulated future.Presented by: EJ Pappas, Field Chief Technology Officer, PKWARE; Alan Rodger, Senior Analyst, Security & Cloud, Bloor Research.
by PKWARE
11/19/2024 4:00 PM
Technology > Cybersecurity webinar by Horizon3.ai for Maximizing Offensive Security: Addressing Shortcomings and Improving Effectiveness
Maximizing Offensive Security: Addressing Shortcomings and Improving Effectiveness
Offensive security is essential for identifying and exploiting system vulnerabilities, but current practices often have gaps that reduce their effectiveness. This presentation will explore these deficiencies and offer practical strategies to enhance the accuracy and impact of offensive security assessments, ultimately improving the overall effectiveness of security programs.In this session you will learn:1. Introduction to Offensive Security2. Types of Offensive Security Approaches3. Identifying Gaps in Offensive Security Programs4. Strategies for Optimizing and Overcoming Gaps in Offensive SecurityYou can also participate in the live Q & A with our expert panel.Speaker: Phil Wylie, Offensive Security Expert, Horizon3.ai.
11/12/2024 8:30 AM
Technology > Cybersecurity webinar by ReversingLabs for The MLephant in the Room: Detecting ML Malware
The MLephant in the Room: Detecting ML Malware
As the demand for AI capabilities grows, LLMs and other ML models are increasingly included in the software that we develop and consume.Of particular note are Pickle files, which represent 83.5% of all ML models. Their popularity has attracted the eye of threat actors and has become a new attack vector of choice.To help businesses stay ahead of the threat, ReversingLabs has developed the ability to detect malicious machine learning models and identify unsafe function calls during deserialization, flag unusual behaviors, and automatically classify models exhibiting these behaviors as suspicious or malicious.Join this webinar to learn:✓ What exactly ML models are and why they’re important ✓ The distinction between API and ML models and the role of each✓ Why ML models are so frequently shared and, unfortunately, abused✓ The serialization and deserialization process and how it’s used to spread malware✓ How ReversingLabs has developed the capability to detect ML malware before it can cause harmRegister Now
11/6/2024 5:00 PM
Technology > Cybersecurity webinar by McDonald Hopkins for Top Protection Strategies Against Financial Cyber Fraud: Are you Ready to Respond?
Top Protection Strategies Against Financial Cyber Fraud: Are you Ready to Respond?
Cybersecurity is essential for reducing the risks linked to Business Email Compromise (BEC), wire fraud, and electronic funds transfer (ETF) threats. It involves a comprehensive set of strategies that focus on mitigating supply chain vulnerabilities, combating the effects of AI-generated deep fakes, and gaining insight into the tactics, techniques, and procedures (TTPs) used by malicious actors.In this webinar presented by the McDonald Hopkins’ Data Privacy and Cybersecurity Practice Group, Kevin Baker (Chief Information Security Officer at Fortress Security Risk Management) will join attorneys Robert Cohen and Kate Furstenau to discuss effective protection strategies, what constitutes a data breach and understanding the recovery process.Topics include:• Cybersecurity's role in preventing BEC/wire fraud/ETF• Threat Actor TTP's• Breach, privacy and reporting• Notice requirements• Recovery of electronically transferred funds• Best practices for preventionSpeakers: Robert Cohen, Member; Kate Furstenau, Associate; Kevin Baker, Chief Information Security Officer, Fortress Security.
11/6/2024 4:00 PM
Technology > Cybersecurity webinar by Barracuda Networks for Barracuda Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best practices
Barracuda Threat Spotlight report: Latest ransomware trends, real-world attack analysis, and best practices
Barracuda’s annual Ransomware Threat Spotlight report is out, packed with high-value insights about the past year’s biggest developments and trends. The report is prepared by top threat experts, based on information from reported global ransomware attacks along with data gathered by our Extended Detection and Response (XDR) deployments.Attend this webinar and get a deep dive into the key takeaways, along with plenty of detailed analysis of real-world attacks and actual SOC responses.After attending this session, you’ll know what to expect from ransomware crooks in the coming year—and you’ll know all about advanced strategies and technologies to beat back their nastiest, most sophisticated efforts to steal your data, extort your money, and wreck your operations.Of course, you could just skip it and hope for the best. But the smart money says don’t miss this one—register now.Speaker: Adam Khan - VP, Global Security Operations, Barracuda Networks.
11/5/2024 4:00 AM
Technology > Cybersecurity webinar by Veeam for Kubernetes, Data Protection & the Road Ahead
Kubernetes, Data Protection & the Road Ahead
Discover the latest trends and innovations in the Kubernetes data protection market. Hear from industry experts and customers about the key factors to consider when choosing a data protection solution for your modern environment. Learn why Veeam Kasten has been consistently ranked as the leader for four consecutive years and the exciting road ahead.Speakers: Darrel Kent - Field CTO and Analyst, GigaOm; Anthony Swingley - Senior System’s Engineer, Parts Authority; Gaurav Rishi - Vice President, Product Management, Veeam Software.
by Veeam
10/30/2024 5:00 PM
Technology > Cybersecurity webinar by CrowdStrike for Protect Your Small and Mid-Sized Business From Cyber Threats This Holiday
Protect Your Small and Mid-Sized Business From Cyber Threats This Holiday
As the holiday season approaches, businesses face a heightened risk of cyber threats. In 2023, the CrowdStrike eCrime Index saw a 30% spike just before the start of the holiday season. This webinar is designed to equip you with the knowledge and tools needed to help safeguard your business from ransomware, credential theft and other cyber crimes. Join us to learn from our industry experts, Kurt Baker and Dana Larson, about the latest eCrime trends, practical security measures and best practices for keeping your business and customer data secure. Don’t let cybercriminals ruin your holiday cheer — register now to protect your business during this critical time! Key takeaways:Learn about common threats like phishing, ransomware, credential theft, payment-system attacks and consumer focused scamsDiscover actionable next steps you can take to prepare your business for the rise in eCrimeSee how CrowdStrike can protect you around the clock during the holiday rushSpeakers: Kurt Baker - Senior Director of Product Marketing for Intelligence, CrowdStrike; Dana Larson - Senior Product Marketing Manager, CrowdStrike.
10/23/2024 6:00 PM
Technology > Cybersecurity webinar by Omada for 5 IGA Essentials to Support Your Cybersecurity Strategy
5 IGA Essentials to Support Your Cybersecurity Strategy
Join our upcoming webinar to learn how identity governance and administration can help you strengthen your security posture and achieve compliance. In today’s complex threat landscape, IGA is essential for protecting your organization’s sensitive data and meeting compliance requirements. By effectively managing user access and enforcing policies, IGA helps reduce the risk of data breaches and security incidents. Discover the top IGA essentials for a comprehensive security strategy in our upcoming webinar. In this informative webinar, Paul Walker, Field Strategist at Omada, will unveil: • Why IGA is key to Zero Trust • Five IGA best practices to improve your Cyber Security Strategy • How Modern IGA can support you with security, compliance and efficiency Don’t miss this opportunity to learn how IGA can help you:• Reduce the risk of data breaches • Improve operational efficiency• Meet compliance requirementsSpeaker: Paul Walker, Field Strategist, Omada.
by Omada
10/17/2024 1:00 PM
Technology > Cybersecurity webinar by Rehmann for Maximizing Organizational Effectiveness Through Technology
Maximizing Organizational Effectiveness Through Technology
As technology continues to advance and the looming threat of cyber attacks grows at an alarming rate, it is important for your organization to adapt in order to keep serving your community effectively. In this webinar, you’ll learn how to maximize the resources you currently have and how to identify appropriate solutions to fill in any gaps in your technology infrastructure.Contributors: Ben Eavey, Erinn A. Trask, CPA
by Rehmann
10/16/2024 3:00 PM
Technology > Cybersecurity webinar by Thales for The Power of a Future-Proof Data Security Strategy
The Power of a Future-Proof Data Security Strategy
In this session, our speakers will discuss ways to build a future-proof data security strategy for the evolving cyber landscape, combining a vision of possibility while staying grounded in reality.Join this webinar to learn about:• Future-proof data security strategies and risk-based essentials needed to protect against threats and enforce compliance across the organization.• Key use cases for unifying data visibility and control on-premises, cloud data stores, data lakes, and storage systems.• Thales Data Security innovations to address the dynamic challenges of the modern threat landscape while keeping your organization digitally resilient.Presented by Terry Ray, SVP Data Security CTO, Imperva, a Thales Company; Todd Moore, VP of Encryption Products, Thales; Krishna Ksheerabdhi, VP of Product Marketing, Thales.
by Thales
10/16/2024 1:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

 

page 1 of 10

;