Cybersecurity Webinars

Search for upcoming webinars for Cybersecurity

Previous Webinars

Technology > Cybersecurity webinar by Barracuda Networks for EDR, MDR, XDR: What they are, how they work, and how to choose
EDR, MDR, XDR: What they are, how they work, and how to choose
Today’s highly evolved, AI-enhanced cyberthreat landscape demands powerful new strategies for threat detection and response. But how do you decide which of many options is optimal for your organization?Join this webinar and get the whole story about the varieties of endpoint (EDR), managed (MDR), and detection and response (XDR). Discover the advantages and limitations of each approach, and see how to choose the best threat detection-and-response strategy for your organization.Find out:• How to automate and centralize threat-hunting and incident response• How to optimize in-house resources and the role of SOC-as-a-Service• When to use managed services instead of new cybersecurity staffingWhether your organization has a fully staffed SOC, one person who does IT in addition to another job, or anything in between, see how to harden, simplify, and automate your security by gaining a full understanding of today’s options for advanced detection and response.Reserve your spot now.Speakers: Adam Searcy - Product Marketing Manager, Managed XDR, Barracuda Networks; Chris Crellin - Sr. Director, Product Management, Barracuda Networks.
9/24/2024 2:00 AM
Technology > Cybersecurity webinar by OpenText Cybersecurity for Establish trusted AI with DSPM best practices
Establish trusted AI with DSPM best practices
Generative AI is a powerful tool, carrying inherent risks like any new technology. To effectively harness its potential, organizations must prioritize curating high-quality data—great AI requires great data. In this webinar, we’ll delve into strategies that empower security professionals to harness AI effectively while maintaining data safety and ethical practices. Specifically, we’ll dive into:• Complex Challenges: Gain a deep understanding of the interplay between data security and AI, including the specific risks associated with generative models, while proactively tackling challenges and emphasizing the importance of human oversight for data quality and optimal outcomes.• Establishing Data Trust for AI: Adopt a holistic approach to data and identity management, tackling challenges like ROT data, mismanaged corporate data (including intellectual property and employee data), and privacy considerations.• Proven DSPM Approach: Discover a reliable Data Security Posture Management (DSPM) approach for safeguarding data throughout its lifecycle, especially in the context of data for AI.• Access Control: Learn how to manage access to data by utilizing role-based controls (RBAC), principle of least privilege and other key components in Identity and Access Management (IAM).Join us as we navigate how to empower organizations to adopt AI responsibly. September 17, 2024| 11:00 a.m. ET | 5:00 p.m. CESTPlease use business emails only, all personal emails will not be eligible. Please fill in all form fields in full, any incomplete forms will not be eligible. Please attend via video to ensure your attendance is recorded.Speakers: Greg Clark, Director Product Management - OpenText; Rob Aragao, Chief Security Strategist - OpenText; Valerie Mayer, Senior Product Marketing Manager - OpenText.
9/17/2024 3:00 PM
Technology > Cybersecurity webinar by Nokia Corporation for Demystifying Telecom SaaS Security
Demystifying Telecom SaaS Security
Data security and data privacy are the top concerns for communications service providers. As a result, they allocate substantial resources to safeguard their customers and operations against unauthorized data access and disclosure. Historically, these concerns have made many providers hesitant to shift their network operations and management to software-as-a-service (SaaS) models that utilize the public cloud. In this fireside chat, Vivek Gupta, Director, Telco Industry at Google, and Philip Blanchar, Senior Director, SaaS Delivery and operations at Nokia, will address the main security myths and misconceptions related to Telecom SaaS adoption.Speakers:Vivek Gupta, Director, Telco Industry at GooglePhilip Blanchar, Senior Director, SaaS Delivery and operations at Nokia
9/17/2024 2:00 PM
Technology > Cybersecurity webinar by Claroty for Webinar | Streamlining OT Vulnerability Management
Webinar | Streamlining OT Vulnerability Management
Amid today's rapidly evolving digital landscape for cyber-physical systems (CPS), security teams are grappling with an overwhelming array of vulnerabilities within operational technology (OT) environments. The conventional industry approach of utilizing standard CVSS scores to prioritize vulnerabilities is becoming increasingly insufficient. Effective vulnerability prioritization workflows and dependable validation tools are critical for understanding which exposures are most likely to be exploited.In this webinar session, Gregory Thomas, Solution Engineer at Claroty will offer insights and guidance on streamlining the vulnerability management process in the context of a dynamic exposure management framework.After this session, you’ll be able to:• Prioritize vulnerabilities based on their relevance to your unique environment• Understand which tools can help validate a vulnerability’s exploitability• Discover how to rank assets higher in criticality based on their operational context Speaker: Greg Thomas, Solution Engineer, Claroty.
by Claroty
9/12/2024 3:00 PM
Technology > Cybersecurity webinar by OpenText Cybersecurity for Unmasking the Threat: Deepfakes and the Future of Cybersecurity
Unmasking the Threat: Deepfakes and the Future of Cybersecurity
Join us for an insightful webinar where we delve into the emerging threat of deepfake technology and its implications for the security landscape. This session is designed for cybersecurity professionals, IT managers, and anyone interested in understanding how deepfake technology is reshaping the threat environment. Gain a comprehensive understanding of the deepfake phenomenon and learn how to protect your organization from this growing threat. Equip yourself with the knowledge and tools necessary to stay ahead in the ever-evolving field of cybersecurity.Presented by Matt Aldridge, Principal Solutions Consultant, and Tyler Moffitt, Senior Security Analyst.
9/4/2024 2:00 PM
Technology > Cybersecurity webinar by Mimecast for APAC Threat Intelligence Webinar
APAC Threat Intelligence Webinar
Our panel of cybersecurity experts will unpack the latest Global Threat Intelligence Report, focusing on key insights from the first half of 2024 and what it means for APAC including in-depth analysis of threat activities, attack trends, and recommendations to mitigate cyber risks.We'll also explore the growing threat of Business Email Compromise (BEC), historically the most financially damaging attack — the FBI reporting it as 64x more costly than ransomware – and how to defend your organisation from it!  Join our security experts in this webinar as they discuss:Key findings from the latest Mimecast Global Threat Intelligence Report from the first half of 2024Actionable recommendations for APAC businesses to stay ahead of cyber threatsRecent BEC attacks, and why traditional solutions struggle to detect themHow and where to deploy the latest advancements in AI/ML in the fight against BEC Speakers: Garrett O'Hara - Senior Director, Solutions Engineering APAC; Ryan Economos - Mimecast’s Field CTO; Dr Kiri Addison - Senior Manager, Product Management.
9/4/2024 6:00 AM
Technology > Cybersecurity webinar by Menlo Security for [Live Webinar] The Crowdstrike Wake-Up Call: Strengthening Your Security Posture
[Live Webinar] The Crowdstrike Wake-Up Call: Strengthening Your Security Posture
Is Your Organization Ready for the Next Cyber Threat?In today's rapidly evolving digital landscape, the question isn't if you'll face a cyberattack—it's when. With cyber threats growing more sophisticated every day, ensuring your organization’s security posture is robust and adaptive is more critical than ever.Welcome to Menlo Security Webinar, where we dive deep into the essentials of fortifying your cybersecurity defenses. This is not just another checklist—it's a comprehensive guide to transforming your security strategy with actionable insights and expert guidance.You’ll learn how to:• Understand Emerging Threats: Gain critical insights into the latest cybersecurity threats and how they could impact your organization.• Evaluate Your Current Posture: Learn to assess your existing security measures and identify any gaps or vulnerabilities.• Actionable Strategies: Discover practical, real-world strategies to enhance your security posture and safeguard your digital assets.This is your chance to gain actionable insights and discover how to strengthen your security posture against modern cyber threats. Secure your spot now and join us in transforming your approach to security!Reserve your seat now.We are looking forward to meeting you there!
8/28/2024 5:00 AM
Technology > Cybersecurity webinar by IDC - Asia/Pacific for Steering through the AI Era: Fortifying Cybersecurity to Foster Innovation
Steering through the AI Era: Fortifying Cybersecurity to Foster Innovation
In today's rapidly evolving digital landscape, AI models are at the forefront of innovation, driving unprecedented advancements across various industries. According to IDC's August 2023 GenAI ARC Survey, 83% of IT leaders believe leveraging GenAI models with their own business data will provide a significant competitive advantage. However, this surge in innovation also brings heightened security concerns.Nearly 31% of enterprises in Asia/Pacific in 2024, report that security is a major concern when deploying automation technologies. Tech buyers are wary of the dual-edged nature of AI; while it offers unparalleled efficiency and problem-solving capabilities, it also introduces new vulnerabilities. The integration of AI into business operations necessitates robust security measures to protect against sophisticated cyber threats targeting critical infrastructure, personal data, and AI systems themselves.Key discussion points​:• Understand Asia/Pacific’s outlook on security and AI investments, including CISO challenges, priorities, and investment strategies, supported by case studies from around the region.​• Discover key AI use cases and learn how tech vendors can support enterprises in an open, complex, and interconnected world of AI.​• Discuss infrastructure strategies to support innovation through GenAI while maintaining security, and how cybersecurity vendors can assist organizations in integrating GenAI into their processes.Speakers: Sakshi Grover, Senior Research Manager - IDC; Christian Fam, Senior Research Manager - IDC.Register now.
8/13/2024 6:00 AM
Technology > Cybersecurity webinar by Veeam for Veeam Live webinar  Ransomware Trends from Real-world Ransomware Cases
Veeam Live webinar Ransomware Trends from Real-world Ransomware Cases
Coveware by Veeam is on the frontlines of ransomware before, during, and after an attack. This session will review the high-fidelity threat intelligence we’ve collected directly from Coveware by Veeam cases from 2024.Join us to gain valuable insights into how these actors develop and execute cyberattacks on enterprise networks and what you should expect from engaging and negotiating with ransomware groups.Specifically, we’ll cover:• The actual tactics, techniques, and procedures (TTPs) that cyber attackers use to infiltrate your data.• The percentage of ransomware cases by attack vector.• The top 12 threat actors to look out for based on a percentage of ransomware cases in 2023.• The financial trends within ransom payments, including ransom amounts and payment resolution rates.• And more!Speaker: Teck Sze Tay, Systems Engineering Manager, Southeast Asia & Korea (SEAK) - Veeam Software.
by Veeam
8/13/2024 3:00 AM
Technology > Cybersecurity webinar by Flowmon for Deep Dive into Network Traffic with Flowmon Packet Investigator
Deep Dive into Network Traffic with Flowmon Packet Investigator
Network traffic analysis is crucial for maintaining the health and security of your network infrastructure. However, addressing challenging issues related to packet capture and analysis can be daunting, especially if you lack deep knowledge of network protocols. This webinar is designed to help you overcome these challenges with the powerful capabilities of Flowmon.Key Takeaways:- Understanding the basics of network traffic analysis and its importance.- How to capture and analyze packets effectively using Flowmon.- Step-by-step live demonstration of troubleshooting using Flowmon Packet Investigator.- Tips and tricks for leveraging Flowmon without needing deep protocol knowledge.- Q&A session to address your specific concerns and queries.Don't miss this opportunity to enhance your network analysis skills and make the most out of Flowmon's advanced features. Register now and take the first step towards mastering packet analysis! 
by Flowmon
7/23/2024 1:00 PM

Why Cybersecurity webinars?

Cybersecurity webinars are transforming the landscape of digital safety education, providing an accessible platform for professionals and enthusiasts alike to deepen their understanding of protecting digital assets. Have you explored this dynamic learning avenue yet? By integrating cybersecurity webinars into your professional growth plan, you access a vast repository of knowledge covering everything from basic cyber hygiene practices to advanced threat intelligence strategies, all without stepping out of your home or office.

These webinars are more than just educational tools; they offer a unique opportunity to connect with leading experts and fellow participants globally, fostering a community of shared learning and networking. Whether you're aiming to enhance your cybersecurity skills, keep up with the rapidly changing technology landscape, or expand your professional network, cybersecurity webinars stand out as an essential resource.

Explore our other webinars and start your journey to success. For instance, check educational webinars today.

;