www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:45e3  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-Hq_DjARBuvQLx_yEmt85qd-28vuxD1syxy8f3OfUZCHbyGzuvjnom8lsaH9iUbRCFO5wTnnNI1...
Effective URL: https://www.scmagazine.com/webcasts?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4B...
Submission: On November 08 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About



CYBERSECURITY WEBCAST CALENDAR

November
16
1:00 PM ET
CybercastThu | 16 | 1:00 PM ET
Ransomware: Designing a Strategic Detection and Response Plan
The increased complexity of malicious actors’ techniques demand CISOs stay one
step ahead of the threat landscape while still preparing for potential
worst-case scenarios. Join this panel discussion to learn the steps CISOs can
take to minimize the impact of a ransomware attack. The discussion explores: The
latest adversarial trends a...
More info
All categories
All event types
 * Upcoming
 * On-demand

December

CybercastTue | 5 | 2:00 PM ET
Implementing a Practical AppSec Program: Expert Insights on Strategy & Execution
In application security, recognizing threats is just the beginning. Real success
requires choosing the right tools, adopting effective methodologies, and
integrating security practices into development gates across the software
development lifecycle — from “shift left” early-stage strategies to “shift
right” monitoring post...
More info

CybercastWed | 6 | 2:00 PM ET
Network security in 2024: What has changed in the era of cloud computing, and
how to adapt
In an era dominated by cloud computing, the landscape of network security is
undergoing a paradigm shift, presenting both unprecedented challenges and
opportunities. Join us for an insightful webcast as we delve into the dynamic
realm of network security in the age of cloud computing. We’ll explore the
multifaceted aspects of securing networks in ...
More info

CybercastThu | 7 | 1:00 PM ET
A CISOs Guide to Effective Identity & Access Management (IAM) Practices and
Technologies
The secure and efficient administration of user and technology identities across
multiple Cloud and on-premises environments has been a challenge for
organizations. Consequently, many CISOs are examining new Identity Governance
and Administration (IGA) platforms and authentication mechanisms, which will
involve large investments and implementation...
More info

CybercastThu | 14 | 2:00 PM ET
Unveiling the Hidden Threat: Hybrid Attackers Leveraging Identities to Execute
Ransomware
A new breed of adversaries has emerged — hybrid attackers. These assailants have
mastered the art of combining multiple attack vectors, exploiting
vulnerabilities and leveraging identities to execute one of the most devastating
cybercrimes of our time — ransomware. Ransomware is not just the end goal;
hybrid attackers often use it as part of their...
More info

CybercastTue | 19 | 1:00 PM ET
CISO Stories: Balancing IAM Cost, Security, and Experience
In today’s digital enterprises, identity-centered security is critical to reduce
vulnerable attack surfaces, but implementation or rearchitecting efforts can be
costly, burdensome to security teams, and create friction for users. In this
panel discussion, CISOs share their IAM implementation and maturation best
practices and lessons learned alo...
More info

Cybercast
Optimizing AppSec: A Deep Dive into ASPM’s Risk-Based Approach
Applications and software supply chains are constantly changing. So is the
threat landscape. Vulnerabilities, misconfigurations, exposed secrets, design
flaws, sensitive data exposure, etc., will always be inevitable. That’s why
application security remains such a vibrant market and why application security
teams have a host of tools (SAST, SCA...
More info

Cybercast
Application Security Posture Management is essential to your business. Here’s
how to get there.
AppSec has long been considered a subset of IT security, but today’s threats
make securing applications an imperative for the entire business. But how do you
make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity
company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped
one client on its journey to eff...
More info

Cybercast
Modern Identity Governance & Administration for Mid-sized Organizations
Just because a business is mid-sized doesn’t mean the security risks it
encounters are any smaller than those experienced by large enterprises. All
organizations, regardless of size, face the same challenges around identity
growth and management. A growth that places a greater burden on smaller
organizations with limited resources that need to rem...
More info

Cybercast
The Reckoning: Why traditional MFA is not enough for cyber insurance compliance
The Reckoning is here for Traditional MFA, as it’s not enough for cyber
insurance compliance. Did you know that the most popular methods of MFA (like
OTP and push to email / text) are easily hacked and are grounds for higher
premiums and non-renewals? Everyone knows that MFA provides better protection
against hackers than just SSO and 2...
More info

Cybercast
Using Centralized Data Security Management to Turn Cybersecurity into a Team
Sport
A company’s data is its lifeblood and must be protected at all costs. But the
larger the data pile, the harder it is to manage. Attackers know this and are on
a nonstop hunt for holes in your tech stack to exploit. To have a fighting
chance, organizations need to approach security as a team sport.In this SC
webcast, host Bill Brenner sits down wit...
More info

Cybercast
SEC Cyber Compliance Readiness: 4 Steps Every Leader Should Take Now
The U.S. Securities and Exchange Commission’s highly-anticipated new
cybersecurity rules are finally in force, and deadlines are approaching quickly.
Organizations, both public and private, will now have to take quick action to
either establish or transform their cybersecurity programs to come into
compliance with these new regulations and prevent...
More info

Cybercast
They’re not on your payroll, but you still must secure their data
The volume of identities in use by the average organization has skyrocketed over
the past several years, and non-employee identities are no exception. A recent
study conducted by McKinsey found that 36% of the U.S. workforce is now made up
of contract, freelance, and temporary workers—up from 27% in 2016. In addition
to contract workers, today’s b...
More info

Cybercast
Zero Trusts Given: Enterprise Browser Security and the Digital Workplace
Getting work done has gotten easier: instead of having to deal with on-premises
applications, VPNs, and VDI, employees and contractors can now do most of their
work using only a browser, whether they are working onsite, 100% remotely or in
a hybrid environment.  But with the browser effectively becoming the workplace
super app, enterpris...
More info

Cybercast
Incident Response: Lessons from the front lines of Fortune 500 cyber attacks
When Fortune 500 companies suffer a cyberattack resulting in a data breach, they
go down hard. “For organizations to recover is like rightsizing the Titanic,”
says Nick Essner, head of cyber solutions at CYGNVS. Essner has seen the damage
up close, time and again, as an incident response leader for 15 years at
companies like Accenture and Mandiant...
More info

Cybercast
The Path to Autonomous Identity Security | How to automate manual identity tasks
for a more secure & efficient organization
Managing access for hundreds or even thousands of identities in disparate
systems with manual processes is difficult, inefficient and – worst of all –
risky. Traditional certification campaigns are flawed and time-consuming because
certifiers lack the insights and automation needed to make accurate,
forward-looking decisions. Companies need t...
More info

Democast
Secure and efficient app development? How Snyk makes both possible
It’s more important than ever for apps to remain secure through their entire
development lifecycle – but without impacting dev teams’ ability to innovate
with efficiency. Fortunately, these two goals don’t have to contradict each
other – and one way to balance these two needs is to approach security from a
dev point of view. This live demo wi...
More info

Cybercast
Seeking safer shortcuts for devs: Snyk’s 2023 State of Open Source Security
Report
Open source code provides developers with the shortcuts they need to innovate
and iterate faster. But due to a host of open source vulnerabilities, some
shortcuts are safer than others. Metaphorically speaking, are your
organization’s developers taking a well-lit, mapped-out shortcut, or straying
down a mysterious, risky, and forebo...
More info

Cybercast
Cyber risk is business risk: Walking the intersecting lines
Cyber risk and business risk are increasingly one and the same, and it’s about
time that business-minded executives understood that reality when managing their
budgets and agendas. With cybercriminal activity showing no signs of slowing
down, companies must understand that a commitment to mitigating cyber risk
represents an investment in the busin...
More info

Cybercast
Real-world Insights from a Sophos Threat Analyst: It’s Great You Have a
Firewall, But Here’s Why You Shouldn’t Skip Over MDR
We’re hosting an eye-opening webinar aimed to help you take your digital
security to the next level — all from the vantage point of security analysts
dealing with threat intelligence, threat hunting, research, detection
engineering and incident response.   In this session, Real-world Insights from a
Sophos Threat Analyst, Sophos will dive ...
More info

Cybercast
Revolutionizing the essentials: Friction-minimizing approaches to overcoming
advanced account takeover (ATO)
As bad actors look to blur the lines between real and fake, cybersecurity
experts need to stay one step ahead of tech-savvy fraudsters. A simple, yet
robust set of fraud prevention practices is often the best approach for stopping
fraudsters at the gate.In this impactful Q&A webcast, you will see through the
lens of two expert solution enginee...
More info

Cybercast
Prioritizing Blue Team Success Over Red Team Wins
Though red teaming is sometimes perceived as pen testing with the gloves off, in
reality, the goal of these engagements isn’t to prove how much damage these
skilled testers can do. Modern red teams must set out to provide learning
opportunities for organizations and their blue teams, running attack simulations
to help teach them how to better prot...
More info

Cybercast
Reducing silos between Developers and AppSec in your Software Supply Chain with
Snyk and ServiceNow
For developer and AppSec teams alike, securing critical components of the
software supply chain, including open source libraries, container images, cloud
infrastructure, and developer tools, is increasingly essential. But more often,
tracking dependencies to fixing vulnerabilities can still be siloed because
common tools and processes to create un...
More info

Cybercast
Rising tensions, heightened stakes: A crash course in the latest observations
from the cyber threat landscape
The threat landscape is in continuous motion. It’s constantly shifting and
reshaping itself, and it’s up to security professionals to establish that
they’re charting the changes, lest they find themselves falling behind in the
never-ending race with cyber adversaries. In this webcast, PwC’s Global Threat
Intelligence te...
More info

Cybercast
Modern privileged access management in the cloud: What’s in, what’s out?
Since privileged access is usually the last link in the cyber kill chain,
Privileged Access Management (PAM) has evolved in importance from simple
password management to an essential cyber risk reduction imperative.  Now is the
time to redefine what it means to have a mature PAM program in today’s
multi-cloud world. Nearly half of all data...
More info

Cybercast
Tackling The Unique Challenges of Kubernetes & Container Security
Even cybersecurity pros struggle to address the unique challenges of Kubernetes
and container security. It can be disorienting to take a career full of
knowledge in more traditional platforms and apply it to the leading edge of
declarative infrastructure and microservices. This webcast is designed to help
security teams get over the initial cultur...
More info

Cybercast
Evening the Odds Against Overpowered Cyber Adversaries: A Business Impact
Analysis
Cyber threats are costing businesses more than you even realize. In a recent
survey of 3,000 security and IT leaders, 55% of respondents said that dealing
with cyberthreats has negatively impacted their IT team’s work on other
projects, while 64% said that efforts to combat the latest threats were taking
away valuable time and resources from mo...
More info

Cybercast
Getting AppSec Right: Traceability and Security from Code to Cloud
Getting AppSec Right: Traceability and Security from Code to
Cloud    Organizations want to deliver secure applications quickly, but rapidly
changing and increasingly complex development environments make it difficult to
find, prioritize and fix application vulnerabilities. Further, when AppSec teams
discover security issues, they lack e...
More info

Cybercast
Incident Response War Stories: When MDR Would Have Made the Difference
The Managed Detection and Response (MDR) market is heating up as lean security
teams lacking the human and financial resources of larger organizations clamor
for tools to uncover and stop cyber intrusions more quickly. They understand
that when a bad actor penetrates their organization, every second counts. Many
have learned this lesson the hard w...
More info

Cybercast
The Three Steps to Cyber Readiness
In the face of rising cybersecurity threats, cyber readiness continues to be an
urgent matter for every organization. But how do you achieve it?  Cyber
readiness ultimately involves answering three different questions, each related
to a different aspect of cybersecurity. These questions are:  (Network
understanding) What is the state...
More info

Cybercast
Platform for Platforms: Developing Modern Applications at the Edge
Developing applications and web experiences that meet the needs of the modern
user is a robust challenge for any organization. Join Fastly’s Travis Sanders,
Principal Global Technology Solution Architect, in his discussion of the value
of one unified platform for application and website innovation. During this
webinar, Travis and Brock will highli...
More info

Cybercast
SaaS data backups: Automated resilience & recovery in the cloud
As adoption of software-as-a-service (SaaS) applications skyrockets,
cybercriminals understand that the cloud has become a go-to vector for them to
illegally access and compromise your data. Through phishing scams, exploits and
abuse of misconfigurations, adversaries can steal, modify, encrypt or wipe your
valuable SaaS-based assets – resulting...
More info

Cybercast
Passwordless security: Where things stand, and What’s next?
Join this webcast to learn about the findings from the 2023 State of
Passwordless Security report and how you can use it to improve your
organization’s security posture. CRA VP of Content Strategy Bill Brenner, Bojan
Simic, HYPR’s Co-founder, CEO and CTO and  Andrew Shikiar, Executive Director &
CMO, FIDO Alliance discuss key tak...
More info

Cybercast
Reducing risk with user access review automation
The ultimate goal of User Access Reviews is to reduce security risk by ensuring
that all access within an organization is appropriate and limited to legitimate
current use cases. But, as Snowflake grows in terms of employees and systems,
performing these reviews quarterly can become time-consuming, cumbersome, and
error-prone in the absence of aut...
More info

Cybercast
Practical advice for protecting your digital supply chain: A realistic top 5
list
There’s a lot of advice out there for how to secure the hardware, firmware and
software that encompasses your company’s digital supply chain. But not all of it
is immediately feasible for everyone, especially for organizations that are
limited in resources or lacking security maturity.  Fortunately, this webcast
will make sense of this c...
More info

Cybercast
The Latest Cybercriminal TTPs: How Public-Sector Defenders Can Stay Ahead
Cybersecurity is a pressing issue for public-sector organizations in the US, as
they face the challenge of sorting through a vast amount of cyber threat
intelligence while operating with limited resources and a shortage of skilled
infosec professionals. The consequences of a successful attack can be
devastating, highlighting the importance of prio...
More info

Cybercast
Generative AI: Understanding the AppSec risks and how DAST can mitigate them
Generative AI tools such as GitHub Copilot and ChatGPT seem to hold promise for
developers looking to write code more efficiently and find quick answers to
programming questions. But especially in these early days, carefree reliance on
such tools can introduce a range of issues related to software functionality,
licensing, and security. Superficia...
More info

Democast
Evading exploit emergencies: Tanium’s keys to prevention & detection
One of the most preventable causes of malicious exploits that result in damaging
breaches or malware attacks is the failure to update known software
vulnerabilities. Ideally, your organization is vigilant enough to patch these
flaws as soon as they are publicly divulged. But if one does slip through the
cracks and becomes exploited, you at least w...
More info

Cybercast
How IT Risk Translates into Enterprise Risk
How IT risk translates into enterprise risk, and how we tie the two together. 
What is IT risk? How has the definition shifted over the years as it relates to
overall enterprise risk?What are key drivers of IT risk on a business today?How
do you quantify and communicate IT risk in a tangible way? Why IT should be seen
as an enabler, rather...
More info

Cybercast
Playing network traffic cop in multi-cloud environments: A guide to detecting &
restricting lateral movement
The latest snapshot of your network traffic logs may look innocent enough, but
hidden amongst your daily activity are the movements of a cybercriminal
adversary who has secretly breached your systems and is now trying to expand its
foothold within your virtual walls in multi-cloud environments. It’s this
east-west infiltration that turns ...
More info

Cybercast
How Ransomware has disrupted the Cyber Insurance market, And what you can do
about it!
The cost of cyber insurance is skyrocketing. In response to a string of
high-profile attacks, record-setting ransomware numbers and government
regulations, insurers are being forced to significantly increase premiums for
cyber coverage. Meanwhile, it’s getting even harder for companies to qualify for
coverage in the first place, as cyber insurance...
More info

Cybercast
Multi-factor authentication, sans passwords: The path forward
Despite their unavoidable flaws, most organizations still require both employees
and customers to use passwords. Yet passwordless solutions are both demonstrably
more secure and readily available. The question for organizations looking to
ditch passwords: Where to begin? This SC Media webcast with HYPR’s Michael
Rothschild will address the path to...
More info

Cybercast
Bolstering customer account security without diminishing privacy
Identity authentication is a critical tool in the fight against fraud,
especially as malicious attackers steal consumer credentials in an attempt to
take over their online accounts. But it’s also important to ensure that having
these safeguards in place doesn’t negatively downgrade the customer experience
or violate an individual’s privacy. Otherw...
More info

Cybercast
Stay Ready so you don’t need to Get Ready
The threat landscape seems to be moving at such an accelerated pace these days.
The constantly moving targets and ever-expanding threat landscape is a reality
that we as leaders need to not only deal with but find ways to get out ahead of.
 Today and from our time in the field, we want to impart some practical ways
that we have seen work to help o...
More info

Cybercast
2023 CISO Cybersecurity Priorities
Every year brings new challenges in protecting our companies and nations from
threat actors. Join our live conversation with key CISOs as we look back at 2022
and review some of the key learnings, and look ahead with a laser focus on 2023
priorities for cybersecurity.  Speakers: Todd FitzgeraldVP, Cybersecurity
StrategyCybersecurity Co...
More info

Cybercast
Beyond basic security compliance: Using automation to build advanced workflows
We’ve heard it before: Achieving minimal compliance with security standards or
frameworks isn’t enough to protect yourself from today’s threats. Basic
compliance needs to be a starting point – a core building block upon which you
must continually improve and scale your security processes. With limited
resources, staffing, and funding inhibiting...
More info

Cybercast
Implementing Identity Access Prioritization and Risk-Based Alerting for
High-Fidelity Alerts
The traditional security monitoring architecture has been troubling security
teams with data silos, performance issues, and delays in retrieving archived
data for years. Many analysts who continue to operate with the antiquated SIEM
architecture stack also experience a high volume of alerts—with many false
positives. Luckily, the internal security...
More info

Cybercast
Stemming the rising tide of fraud with machine learning and AI
Today, successful fraud attempts outnumber those stopped, causing security and
risk experts to wonder: How can we turn the tide? The answer lies in machine
learning (ML) and artificial intelligence (AI) technologies, which ingest and
understand vast historical data to identify fraudulent patterns and suspicious
transactions. This webcast...
More info

Democast
Consolidating without compromise: An XDR democast for analysts of all tenure
Organizations have more security concerns than ever before (due to an
increasingly volatile threat landscape, growing attack surfaces, and increased
volume and complexity of security threats and alerts) and security operations
will continue to be difficult for many organizations to effectively combat
without the right combination of technology, in...
More info

Cybercast
Busting Bots: How to Go Beyond Traditional CAPTCHA With Machine Learning
Bots are pesky, ill-natured, and often spiteful programs. Their capabilities
constantly evolve in order to elude online defenses and take over consumer
accounts. Advanced bot operations use malicious plug-ins, bot farms, and
artificial intelligence to bypass and solve traditional CAPTCHA mechanisms.
Ironically, traditional CAPTCHAs are often more ...
More info

Democast
Dr. DevSecOps: A prescription for alleviating AppSec’s biggest pain points
Secure application development can be a painstaking process, but just how
painful does DevSecOps actually need to be? Companies that are actively engaged
in DevSecOps speak of multiple pain points, from struggles with asset visibility
and discovery to finding ways to close every gap in their defenses. Along the
way, they face an uphill battle t...
More info

Cybercast
CISO Thought Leadership: Becoming a Trusted Partner
CISOs are the most sophisticated buyer in the technology industry. Successful
engagement with these executives requires a nuanced communication strategy that
blends technology, strategic, and leadership content. Above all, solution
providers must establish themselves as trusted partners whose primary mission is
the safety and security of their cus...
More info

Cybercast
EMOTET Exposed: Inside the Cybercriminals’ Supply Chain
New analysis from VMware delves deep into the most recent waves of the Emotet
botnet, providing never-before-seen insights into the malware delivery
mechanism’s malicious components and modules, its execution chains and its
software development lifecycle.  This webcast will reveal key findings and
takeaways from VMware’s researchers, who mana...
More info

Cybercast
Securing – not banning – your employees’ favorite SaaS apps
The growing number of cloud-based SaaS applications that employees are using to
conduct their day-to-day business is dramatically expanding their companies’
attack surface. And malicious actors are increasingly infiltrating networks by
compromising weak credentials used across various cloud applications. The
initial knee-jerk reaction among sec...
More info

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies