Upcoming Webinars
Webinar Archives
Preparing for The Ransomware Onslaught -- Part 3: Ransomware Remediation & Recovery
Date: Mar 28, 2017
View webinar
You've been hit by ransomware - and hit hard. Your organization has decided it won't give in to the attackers' demands for a ransom. Now what?

Enriching Threat Intelligence Data
Date: Mar 23, 2017
View webinar
Security teams now have a wide variety of threat intelligence sources feeding them magical "indicators of compromise." Yet, an IP address or domain name on its own only provides so much intelligence. Understanding the context around these indicators of compromise dramatically increases their value to analysts. Enriching indicator feeds with data from other sources can help analysts better identify patterns and other details that might otherwise be lost during an investigation or analysis.

Becoming a Threat Hunter in Your Enterprise
Date: Mar 16, 2017
View webinar
You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan. What you want is to be a threat hunter.

Building a Cybersecurity Architecture to Combat Today's Risks
Date: Mar 15, 2017
View webinar
"Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. So how can you combat today's risks?

Cloud App Security - Don't let your Office 365 users be your security weak link
Date: Mar 14, 2017
View webinar
As corporate emails and files move to cloud apps such as Office 365 and G Suite to drive efficiencies, the reality is that users are still the weakest security link. That's because hackers are attacking the weakest link in your cybersecurity - your end users.

WANTED: Data Analysts, but are there enough?
Date: Mar 08, 2017
View webinar
As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy need these professionals to make it all work. And yet big consulting firms such as McKinsey Global Institute have been forecasting a shortfall in the talent available to meet the demand. This Radio Show will address the larger question how about higher education is embracing analytics curriculum. Register today!

5 Most Effective Breach Methods - A Virtual Hacker Perspective
Date: Mar 07, 2017
View webinar
The SafeBreach platform continuously simulates hacker behavior, allowing organizations to see the impact from a breach - before it occurs. Which were the most effective techniques we used? How do they work? Which security controls were effective against these methods? How can you stop them?

IT Careers 3.0: What You Need to Get Ahead
Date: Mar 07, 2017
View webinar
In the early years of tech, hard skills were all you needed. Over the last decade, the emphasis shifted to include soft skills such as communication, writing, time management, and collaboration. Today's employers want all of that, plus a working knowledge of business operations to bring the whole package together. Can you keep up with the evolving requirements to be successful in the IT industry? Can anyone?

Breaking The Vulnerability Cycle - Key Findings from 100 CISOs
Date: Mar 02, 2017
View webinar
We surveyed 100 CISOs and security decision makers and found that today's application security teams are facing 3 distinct issues that lead to vulnerability

Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Exclusive: Inside the GETCO Execution Services Trading Floor
Exclusive: Inside the GETCO Execution Services Trading Floor
Advanced Trading takes you on an exclusive tour of the New York trading floor of GETCO Execution Services, the solutions arm of GETCO.