Enriching Threat Intelligence Data Date: Mar 23, 2017 View webinar Security teams now have a wide variety of threat intelligence sources feeding them magical "indicators of compromise." Yet, an IP address or domain name on its own only provides so much intelligence. Understanding the context around these indicators of compromise dramatically increases their value to analysts. Enriching indicator feeds with data from other sources can help analysts better identify patterns and other details that might otherwise be lost during an investigation or analysis.
Becoming a Threat Hunter in Your Enterprise Date: Mar 16, 2017 View webinar You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.
Building a Cybersecurity Architecture to Combat Today's Risks Date: Mar 15, 2017 View webinar "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. So how can you combat today's risks?
WANTED: Data Analysts, but are there enough? Date: Mar 08, 2017 View webinar As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy need these professionals to make it all work. And yet big consulting firms such as McKinsey Global Institute have been forecasting a shortfall in the talent available to meet the demand. This Radio Show will address the larger question how about higher education is embracing analytics curriculum. Register today!
5 Most Effective Breach Methods - A Virtual Hacker Perspective Date: Mar 07, 2017 View webinar The SafeBreach platform continuously simulates hacker behavior, allowing organizations to see the impact from a breach - before it occurs. Which were the most effective techniques we used? How do they work? Which security controls were effective against these methods? How can you stop them?
IT Careers 3.0: What You Need to Get Ahead Date: Mar 07, 2017 View webinar In the early years of tech, hard skills were all you needed. Over the last decade, the emphasis shifted to include soft skills such as communication, writing, time management, and collaboration. Today's employers want all of that, plus a working knowledge of business operations to bring the whole package together. Can you keep up with the evolving requirements to be successful in the IT industry? Can anyone?