How Cyber Attackers Fool Your Employees - And How To Stop Them Date: Jun 22, 2016 View webinar Protecting your enterprise data is often referred to as a technology issue, but most cyber attacks begin by fooling a user into doing something, such as unknowingly downloading malware or giving up security credentials. This "social engineering" is the most common way that an online attacker will gain access to your business - and the hardest to defend against, because it exploits everyday human weaknesses. What can your organization do to keep its employees from being taken in? In this informative Dark Reading webcast, you'll learn about current social engineering methods and the "human" threats posed by online and physical attackers. You'll also get insight on how your organization can train and test its users and employees to recognize and turn away these social engineering exploits - before they compromise your business.
Building a Culture of Analytics Date: Jun 21, 2016 View webinar This session will provide you with best practices for introducing analytics concepts to the business unit's decision-making process, finding the right balance among intuition, experience, and data. Read more and register for this session >>
The Power of Community Defense & Open API Cyber Security Date: Jun 21, 2016 View webinar In today's threat landscape, the only way for you to disrupt attackers and protect your organization is to unite your systems and people, forming a collective defense. In this round-table webcast Matthew Deren at Belk, Cory Bowline at Red Canary and Jason McFarland, Senior Open Source Engineer at Carbon Black, will come together to discuss the value of leveraging community defense and open APIs in incident response.
Analytics Talent: Find It. Use It. Retain It. Date: Jun 16, 2016 View webinar This session will cover how organizations that are new to analytics or are expending their analytics initiatives can find analytics talent, including those in your existing employee base. Read more and register for this session >>
Automation, Speed and Quality: The Keys to Your Continuous Delivery Journey Date: Jun 15, 2016 View webinar Join InformationWeek and a team of industry experts on June 15 for a unique virtual event where you can learn how the Continuous Delivery methodology offers the rapid and agile approach to delivery and still ensures the optimal experience for your customers. Hear from industry experts and discover solutions that will help you automate the app dev pipeline from planning to production. Plus, you will be among the first to hear an exciting announcement from CA Technologies as they unveil new solutions for optimizing your Continuous Delivery strategy.
Effective Digital B2B Collaboration: Overcoming IAM Challenges Date: Jun 15, 2016 View webinar If you provide applications or portals for B2B partners, chances are you're facing some nasty access-related challenges: fragmented login experiences, ballooning password reset requests, and lack of visibility into who has access to what. Imagine what your business could achieve with easier, efficient, more secure access for external users - attend this webinar to learn how to overcome IAM challenges to achieve effective digital B2B collaboration, align your IAM strategy to support your business, and boost security while improving user experience.
Human or Bot? Finding Threats to Your Site with Application Firewalls (WAFs) vs. Web Behavior Analytics Date: Jun 09, 2016 View webinar This webinar discusses how the biggest problems to your web site aren't cross-site scripting and SQL injection attacks. The biggest problems are the ones you don't see: automated bots masquerading as real people browsing through web sites and mobile interfaces. Attend this webinar for what promises to be a spirited web application security conversation between Eric Ogren, senior security analyst at 451 Research, and Rami Essaid, CEO of Distil Networks.
2016 Underground Hacker Marketplace - It's a Good Time to Be a Bad Guy Date: Jun 09, 2016 View webinar The underground marketplace is booming and only getting bigger, more sophisticated, and competitive. Attend this webinar and take a journey with James Bettke, SecureWorks Counter Threat Unit (CTU) researcher and Sean O'Connor, SecureWorks CISO Op-Intel analyst as they walk you through their time spent in the Underground, tracking hackers in numerous forums and marketplaces all over the world. Get information on trends and tips on how to protect your data - Register Today!
Don't Miss The All Analytics Academy: Analytics for All - A Right Start Date: Jun 07, 2016 View webinar Whether your organization is considering the use of big data and analytics, or has taken its first baby steps into data intelligence, our new All Analytics (A2) Academy in June is designed to show you what's possible and how to get started in this discipline, as well as provide you with insight on how to move the initiative forward. Through our five sessions of audio and slide presentations, you will receive advice and best practices on the key stages of launching and advancing an analytics strategy. Register today!
Mobile Threats & How to Keep Them at Bay Date: Jun 01, 2016 View webinar With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection. Learn how to better protect your business from mobile threats by attending this webinar, register today!
Bank Systems & TechnologyBS&T's 2014 Elite 8 executives are leading their banks to success, whether it involves leveraging the cloud, modernizing core systems, or transforming into digital enterprises.