No jitter: Making AI Work for You: The importance of purpose-built AI for CX (March 20th)
IT - CxO Security Events

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and popular cybersecurity author for this eye-opening webinar. Roger will share his take on several significant, advanced, and yes, crazy cyberattacks he's seen in the wild. Plus, he'll share defensive strategies you'll want to implement to prevent them from affecting your network.

It feels like we hear about a new devastating cyberattack in the news every day. And attack methods seem to be proliferating at an exponential rate. So, which tactics should you be aware of beyond standard "click and infect" attack vectors?

You'll see examples of amazing hacks showing how:

  • Your users' passwords can be cracked in mere minutes.
  • Cybercriminals easily bypass Multi-Factor Authentication.
  • Automated malware can devastate your network.
  • Hackers can completely take over your network with a few simple steps.
  • And more!

Find out what you can do to mitigate these advanced hacking techniques instead of becoming the next unknowing victim.

Hosed by DARKReading

Attackers today are more cunning and sophisticated than ever before. The attacks of yesterday - easy to identify and defend against - are long gone. Today, attackers use a sophisticated combination of methods and techniques to target companies' assets and evade detection while many security teams lean on legacy strategies that fail to keep up.

From distributed botnet armies in the tens or hundreds of thousands to DDoS campaigns designed to distract from the real target, attackers are finding new and creative methods to achieve their goals. In this program, we will take a look at some of the tactics your adversaries may deploy - including case studies from the field - to help you better prepare to defend your organization in 2023 ... and in the future.

Hosted by Security Boulevard

It's time to cut the cord and migrate to a cloud-native firewall. Join Zscaler experts for an engaging sessio

Monitoring. Patching. Upgrading. Deploying. Firewall management is a tale as old as time, but it has only become more challenging. With workers connecting remotely, business applications hosted in the cloud and accessible from the internet, your firewall is no longer protecting one network perimeter but thousands.

Relying only on traditional or next-generation firewalls (NGFWs) to protect today's digital landscape may not be enough. As it turns out, they increase costs and complexity while adding risks to the business. What if protecting your users, applications and data was as easy as one, two, three, four?

In this session learn:

  • Tips for selecting the best firewall for your modern business
  • How to lower the total cost of ownership (TCO) without sacrificing security or performance
  • The four easy steps to successfully migrate to a cloud-native firewall solution

Hosted by Security Boulevard

Choosing the right firewall for your needs can be challenging when trying to navigate the sea of firewall data sheets. Discover how to choose the firewall capabilities that are right for your company among the dizzying array of specifications.

When looking for cyber security solutions, IT professionals will benefit from this wide-ranging session.

In this webinar, you will learn:

  • The meaning of all these firewall metrics.
  • The best way to sift through competing firewall brands and the several different models in product catalogs.
  • Why you should focus on the total solution and not just the appliance.
  • Best practices to decide between firewalls.

Hosted by InformationWeek

In this talk, you'll learn what a privacy red team is, how it's different from a security red team, the challenges we faced, and examples of real operations we performed. You'll walk away with a better understanding of how privacy red teaming can benefit your organization, and the role that offense can play in your privacy defense.

Red teams are an important component of a holistic cyber security program because they test how well the program stands up to threats from real adversaries. In 2021, Meta created a privacy red team to help improve our privacy posture and preserve the privacy of our ~3 billion users and their data. Based on that experience, we present the case for why a privacy-focused red team is an important part of a holistic privacy program.

Hosted by blackhat

Businesses should focus first on easier steps that still make significant improvements to security posture, while gaining internal momentum and buy-in for the longer term initiative. The key to all of it is investing in a composable, Internet-native architecture that makes it simple to layer these steps together over time.

As we start 2023, most organizations are clear on the basic definition of Zero Trust: No corporate network request should be implicitly trusted, such that access is only authorized after verifying the identity and context of each request. Unfortunately, confusion remains regarding where and how to start implementation, let alone what it means for a multiyear modernization journey.

Join this webinar as our Zero Trust experts discuss 'quick wins' like:

  • Enforcing strong multifactor authentication and Zero Trust policies for critical applications.
  • Closing inbound ports open to the Internet.
  • Areas not always included in the Zero Trust conversation, like email and DNS.
  • More advanced steps like scanning SaaS apps via CASB, inspecting content via a Secure Web Gateway, or expanding strong MFA or ZTNA to all your apps.

Presented live by featured speaker James Allworth. Moderated by Michael Krieger.

Hosted by DARKReading

Cyber attackers can level organizations with a distributed denial-of-service (DDoS) attack. How do security teams keep stakeholders informed when services are down? Who do they call to remediate the incident and make sure the attackers don't knock everything down again?

Will the right people have the right access to the right resources if the worst happens? In this webinar, learn what processes and procedures should go into the DDoS response playbook, and learn about the tools and techniques that will help bounce back from a DDoS with ease.

When you attend this webinar you'll learn:

  • The latest tactics and techniques of Adaptive DDoS attacks.
  • The minimal requirements for building a DDoS response playbook.
  • How to determine and orchestrate the best method of mitigation per DDoS attack type.

Presented live by featured speakers Jason Clark & Roland Dobbins. Moderated by Becky Bracken.

Hosted by DARKReading

This webinar for software and security leaders will explore: The industry landscape of software supply chain security; New requirements such as attestations for open source artifacts: "Self-vendoring" open source dependencies vs. having a single automated toolchain and Pros and cons of existing solutions such as artifact repositories

Software supply chain attacks grew increasingly prevalent last year and show no signs of letting up in 2023. Attackers continue to target software vendors in an attempt to infiltrate their downstream customers. And with the recent U.S. government mandate for software suppliers to comply with sweeping new security standards by June 2023, the time to act is now.

But how are software development teams expected to proceed, considering years of legacy open source code, a multitude of point solutions for application and open source security and recently-emerged security standards like attestations for open source artifacts?In this session, our experts will break down best practices for addressing these issues so you can start securing your software supply chain, thwart attackers and achieve regulatory compliance.

Hosted by Security Boulevard

A full-day virtual event exploring the latest technologies that can help strengthen your cybersecurity defenses, and the best path for deploying them. You'll hear about state-of-the-art techniques for stopping ransomware in its tracks. You'll learn how to secure your critical data from threats in the cloud.

Ransomware, cyber extortion, zero-day exploits, cloud threats, and supply chain attacks: a seemingly nonstop barrage of new exploits and attack campaigns emerge each day, leaving enterprises wondering if their existing security defenses can thwart the latest - and increasingly sophisticated - threats.

In Q1 2023, Dark Reading will hold a full-day virtual event designed to update your team on some of the most promising emerging cybersecurity technologies and how you can adopt and deploy them in your enterprise.

This event, Emerging Cybersecurity Technologies: What You Need to Know is a free, one-day online conference produced by the editors of Dark Reading, that offers an in-depth look at the latest security technologies and services.

Hosted by DARKReading

See all Archived IT - CxO Security Events articles See all articles from this issue