Webinars

2018 On-Demand Webinars

April

  • Artificial Intelligence in the Cyber DomainArtificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Join this webinar to understand how AI will impact cyber security before you rely on it for network defense.

March

  • Artificial Intelligence in Cyber Warfare: A PrimerArtificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.
  • Hitting the Jackpot: Cybercriminals' Persistent Interest in ATM Exploitation OpsJoin this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
  • Breach Response Readiness: What the C-Suite Needs to KnowGiven today’s cyber landscape, all C-suite leaders have an important role to play in their organization’s cyber security posture and IR plan. Their individual and departmental contributions must help protect vital assets, safeguard privacy and ensure uninterrupted operations.
  • Building a Secure Future for Women in Cyber SecurityAside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.
  • How to Cope with GDPR Strict Breach Reporting Rules With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

February

  • APT37: The Overlooked North Korean ThreatAPT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

January

  • Cyber Security Predictions: What is in Store for the EMEA Regions2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.