13th Annual Original Cyber Security Summit Webinar Series

Our Cyber Webinar Series- In our monthly webinar series, we connect our cyber security landscape sponsors’ solutions with the real world cyber zeitgeist of the moment.


AUGUST WEBINAR FEATURING FORTINET > ON DEMAND

 BE PREPARED | OT GOVERNANCE FROM RISK TO RESPONSE

Recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments. Cybercriminals are maximizing their opportunity by exploiting older vulnerabilities and an expanding attack surface.
Like the Boy Scouts, be prepared fits as a motto for the Operational Technology team. Preparing for, responding to and recovering from cyberattacks should be a strategic part of any continuity plan. Readiness equates to enforcement of rules and policies that provide the visibility, control and situational awareness to respond at the speed of business.
During this session, we will explore governance for OT that includes risk strategy through response planning.  The session will underscore how an integrated cybersecurity platform with the appropriate use automation can support OT readiness.

Link To Sponsor Page

 


JULY WEBINAR FEATURING SECUREWORKS > ON DEMAND

THE ONGOING THREAT OF RANSOMWARE: HOW TO MITIGATE YOUR RISK

Readiness is essential. How will your organization weather the ransomware storm?

Nearly half of organizations surveyed experience attempted ransomware attacks on a monthly, weekly, or daily basis. These pervasive attacks are on the rise and impacting organizations every day. As the growing threat of ransomware looms over your business, it’s important to know how you’ll weather the ransomware storm.

What you’ll learn:

  1. How to proactively defend against the ever-increasing threat of ransomware
  2. Key principles of a mature ransomware strategy
  3. What people, process, and technology investments are required for risk mitigation

This presentation will be a look into recent research uncovering key focus areas common in the organizations defending effectively against ransomware threats. You’ll learn how those results translate to greater business resilience and how specific ransomware risk mitigation tactics can help you assess and strengthen your organization’s ransomware defense and mitigation strategy.

Link to Sponsor Page

 


JUNE WEBINAR FEATURING ONTINUE > ON DEMAND

NONSTOP SECOPS THROUGH REAL-TIME COLLABORATION AND AI-DRIVEN AUTOMATION
Traditional ticketing systems, manual incident investigation and response, myriad tools each with their own portal, siloed responsibilities, and communication – they all lead to human error, frustration, and stress. Join us to see how Ontinue streamlines day-to-day security operations using Microsoft Teams. We’ll also demonstrate how AI can be used to understand and improve defender behavior, leading to enhanced automation that accelerates incident detection, investigation, and resolution.

White Paper Link – Nonstop SecOps

Link to Sponsor Page


MAY  WEBINAR FEATURING CHECK POINT > ON DEMAND

CYBER WAREWARE 2023: AI, CHATGPT, AND COMING BATTLE OF THE AI
Emerging technology is rapidly developing especially OpenAI, with AI ethics policy and governance for Human Centered AI trailing far behind and threat actors/groups rarely concern themselves with ethical use of technology. With exciting advent of ChatGPT and Microsoft $1b investment in OpenAI, cybersecurity professionals need to know about utilization of OpenAI by cyber criminals on the Dark Web to develop malicious code and launch automated campaigns. And prepare for battle of the AIs.

Whitepaper Link – Cyber Warfare 2023

Link to Sponsor Page


APRIL WEBINAR FEATURING ISLAND > ON DEMAND

SECURITY INNOVATIONS: HOW DOES THE BROWSER SECURE THE ENTERPRISE
In today’s digital working world, the most critical information assets for any organization are spread across countless SaaS services and internal applications.. The entire business bears revenue and reputational risk critical business . A report from Gartner finds that 88% of senior organizational executives consider cybersecurity to be a direct threat to business operations, and no longer solely a technical, IT problem.
It makes sense, therefore, to consider a new approach. In most companies, the browser has become the primary work environment. While it may offer a great user experience, the browser was built for consumers and lacks the fundamental controls enterprises need to ensure proper security, visibility, and governance over critical apps and data.

Whitepaper Link – Security Enterprise Browser

Link to Sponsor Page


MARCH WEBINAR FEATURING ZSCALER > ON DEMAND

SEVEN ELEMENTS OF A HIGHLY SUCCESSFUL ZERO TRUST ARCHITECTURE
Organizations of every size are accelerating digital transformation to become more agile—but in the process, they’re greatly expanding their attack surfaces and exposing themselves to new threats. Once-stalwart castle-and-moat security architectures built on VPNs and virtual or physical firewalls are ill-equipped to address these new challenges.

Whitepaper Link – Seven Elements of a Highly Successful Zero Trust Architecture