www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::ac43:45e3
Public Scan
Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-Hq_DjARBuvQLx_yEmt85qd-28vuxD1syxy8f3OfUZCHbyGzuvjnom8lsaH9iUbRCFO5wTnnNI1...
Effective URL: https://www.scmagazine.com/webcasts?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4B...
Submission: On November 08 via api from US — Scanned from DE
Effective URL: https://www.scmagazine.com/webcasts?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4B...
Submission: On November 08 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Log inRegister CISO Stories Topics Events Podcasts Research Recognition Leadership About CYBERSECURITY WEBCAST CALENDAR November 16 1:00 PM ET CybercastThu | 16 | 1:00 PM ET Ransomware: Designing a Strategic Detection and Response Plan The increased complexity of malicious actors’ techniques demand CISOs stay one step ahead of the threat landscape while still preparing for potential worst-case scenarios. Join this panel discussion to learn the steps CISOs can take to minimize the impact of a ransomware attack. The discussion explores: The latest adversarial trends a... More info All categories All event types * Upcoming * On-demand December CybercastTue | 5 | 2:00 PM ET Implementing a Practical AppSec Program: Expert Insights on Strategy & Execution In application security, recognizing threats is just the beginning. Real success requires choosing the right tools, adopting effective methodologies, and integrating security practices into development gates across the software development lifecycle — from “shift left” early-stage strategies to “shift right” monitoring post... More info CybercastWed | 6 | 2:00 PM ET Network security in 2024: What has changed in the era of cloud computing, and how to adapt In an era dominated by cloud computing, the landscape of network security is undergoing a paradigm shift, presenting both unprecedented challenges and opportunities. Join us for an insightful webcast as we delve into the dynamic realm of network security in the age of cloud computing. We’ll explore the multifaceted aspects of securing networks in ... More info CybercastThu | 7 | 1:00 PM ET A CISOs Guide to Effective Identity & Access Management (IAM) Practices and Technologies The secure and efficient administration of user and technology identities across multiple Cloud and on-premises environments has been a challenge for organizations. Consequently, many CISOs are examining new Identity Governance and Administration (IGA) platforms and authentication mechanisms, which will involve large investments and implementation... More info CybercastThu | 14 | 2:00 PM ET Unveiling the Hidden Threat: Hybrid Attackers Leveraging Identities to Execute Ransomware A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their... More info CybercastTue | 19 | 1:00 PM ET CISO Stories: Balancing IAM Cost, Security, and Experience In today’s digital enterprises, identity-centered security is critical to reduce vulnerable attack surfaces, but implementation or rearchitecting efforts can be costly, burdensome to security teams, and create friction for users. In this panel discussion, CISOs share their IAM implementation and maturation best practices and lessons learned alo... More info Cybercast Optimizing AppSec: A Deep Dive into ASPM’s Risk-Based Approach Applications and software supply chains are constantly changing. So is the threat landscape. Vulnerabilities, misconfigurations, exposed secrets, design flaws, sensitive data exposure, etc., will always be inevitable. That’s why application security remains such a vibrant market and why application security teams have a host of tools (SAST, SCA... More info Cybercast Application Security Posture Management is essential to your business. Here’s how to get there. AppSec has long been considered a subset of IT security, but today’s threats make securing applications an imperative for the entire business. But how do you make it so?In this SC Cybercast, Alex Babar, VP of Solutions for cybersecurity company Brinqa, has a discussion with SC’s Bill Brenner about how Brinqa helped one client on its journey to eff... More info Cybercast Modern Identity Governance & Administration for Mid-sized Organizations Just because a business is mid-sized doesn’t mean the security risks it encounters are any smaller than those experienced by large enterprises. All organizations, regardless of size, face the same challenges around identity growth and management. A growth that places a greater burden on smaller organizations with limited resources that need to rem... More info Cybercast The Reckoning: Why traditional MFA is not enough for cyber insurance compliance The Reckoning is here for Traditional MFA, as it’s not enough for cyber insurance compliance. Did you know that the most popular methods of MFA (like OTP and push to email / text) are easily hacked and are grounds for higher premiums and non-renewals? Everyone knows that MFA provides better protection against hackers than just SSO and 2... More info Cybercast Using Centralized Data Security Management to Turn Cybersecurity into a Team Sport A company’s data is its lifeblood and must be protected at all costs. But the larger the data pile, the harder it is to manage. Attackers know this and are on a nonstop hunt for holes in your tech stack to exploit. To have a fighting chance, organizations need to approach security as a team sport.In this SC webcast, host Bill Brenner sits down wit... More info Cybercast SEC Cyber Compliance Readiness: 4 Steps Every Leader Should Take Now The U.S. Securities and Exchange Commission’s highly-anticipated new cybersecurity rules are finally in force, and deadlines are approaching quickly. Organizations, both public and private, will now have to take quick action to either establish or transform their cybersecurity programs to come into compliance with these new regulations and prevent... More info Cybercast They’re not on your payroll, but you still must secure their data The volume of identities in use by the average organization has skyrocketed over the past several years, and non-employee identities are no exception. A recent study conducted by McKinsey found that 36% of the U.S. workforce is now made up of contract, freelance, and temporary workers—up from 27% in 2016. In addition to contract workers, today’s b... More info Cybercast Zero Trusts Given: Enterprise Browser Security and the Digital Workplace Getting work done has gotten easier: instead of having to deal with on-premises applications, VPNs, and VDI, employees and contractors can now do most of their work using only a browser, whether they are working onsite, 100% remotely or in a hybrid environment. But with the browser effectively becoming the workplace super app, enterpris... More info Cybercast Incident Response: Lessons from the front lines of Fortune 500 cyber attacks When Fortune 500 companies suffer a cyberattack resulting in a data breach, they go down hard. “For organizations to recover is like rightsizing the Titanic,” says Nick Essner, head of cyber solutions at CYGNVS. Essner has seen the damage up close, time and again, as an incident response leader for 15 years at companies like Accenture and Mandiant... More info Cybercast The Path to Autonomous Identity Security | How to automate manual identity tasks for a more secure & efficient organization Managing access for hundreds or even thousands of identities in disparate systems with manual processes is difficult, inefficient and – worst of all – risky. Traditional certification campaigns are flawed and time-consuming because certifiers lack the insights and automation needed to make accurate, forward-looking decisions. Companies need t... More info Democast Secure and efficient app development? How Snyk makes both possible It’s more important than ever for apps to remain secure through their entire development lifecycle – but without impacting dev teams’ ability to innovate with efficiency. Fortunately, these two goals don’t have to contradict each other – and one way to balance these two needs is to approach security from a dev point of view. This live demo wi... More info Cybercast Seeking safer shortcuts for devs: Snyk’s 2023 State of Open Source Security Report Open source code provides developers with the shortcuts they need to innovate and iterate faster. But due to a host of open source vulnerabilities, some shortcuts are safer than others. Metaphorically speaking, are your organization’s developers taking a well-lit, mapped-out shortcut, or straying down a mysterious, risky, and forebo... More info Cybercast Cyber risk is business risk: Walking the intersecting lines Cyber risk and business risk are increasingly one and the same, and it’s about time that business-minded executives understood that reality when managing their budgets and agendas. With cybercriminal activity showing no signs of slowing down, companies must understand that a commitment to mitigating cyber risk represents an investment in the busin... More info Cybercast Real-world Insights from a Sophos Threat Analyst: It’s Great You Have a Firewall, But Here’s Why You Shouldn’t Skip Over MDR We’re hosting an eye-opening webinar aimed to help you take your digital security to the next level — all from the vantage point of security analysts dealing with threat intelligence, threat hunting, research, detection engineering and incident response. In this session, Real-world Insights from a Sophos Threat Analyst, Sophos will dive ... More info Cybercast Revolutionizing the essentials: Friction-minimizing approaches to overcoming advanced account takeover (ATO) As bad actors look to blur the lines between real and fake, cybersecurity experts need to stay one step ahead of tech-savvy fraudsters. A simple, yet robust set of fraud prevention practices is often the best approach for stopping fraudsters at the gate.In this impactful Q&A webcast, you will see through the lens of two expert solution enginee... More info Cybercast Prioritizing Blue Team Success Over Red Team Wins Though red teaming is sometimes perceived as pen testing with the gloves off, in reality, the goal of these engagements isn’t to prove how much damage these skilled testers can do. Modern red teams must set out to provide learning opportunities for organizations and their blue teams, running attack simulations to help teach them how to better prot... More info Cybercast Reducing silos between Developers and AppSec in your Software Supply Chain with Snyk and ServiceNow For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, cloud infrastructure, and developer tools, is increasingly essential. But more often, tracking dependencies to fixing vulnerabilities can still be siloed because common tools and processes to create un... More info Cybercast Rising tensions, heightened stakes: A crash course in the latest observations from the cyber threat landscape The threat landscape is in continuous motion. It’s constantly shifting and reshaping itself, and it’s up to security professionals to establish that they’re charting the changes, lest they find themselves falling behind in the never-ending race with cyber adversaries. In this webcast, PwC’s Global Threat Intelligence te... More info Cybercast Modern privileged access management in the cloud: What’s in, what’s out? Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative. Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data... More info Cybercast Tackling The Unique Challenges of Kubernetes & Container Security Even cybersecurity pros struggle to address the unique challenges of Kubernetes and container security. It can be disorienting to take a career full of knowledge in more traditional platforms and apply it to the leading edge of declarative infrastructure and microservices. This webcast is designed to help security teams get over the initial cultur... More info Cybercast Evening the Odds Against Overpowered Cyber Adversaries: A Business Impact Analysis Cyber threats are costing businesses more than you even realize. In a recent survey of 3,000 security and IT leaders, 55% of respondents said that dealing with cyberthreats has negatively impacted their IT team’s work on other projects, while 64% said that efforts to combat the latest threats were taking away valuable time and resources from mo... More info Cybercast Getting AppSec Right: Traceability and Security from Code to Cloud Getting AppSec Right: Traceability and Security from Code to Cloud Organizations want to deliver secure applications quickly, but rapidly changing and increasingly complex development environments make it difficult to find, prioritize and fix application vulnerabilities. Further, when AppSec teams discover security issues, they lack e... More info Cybercast Incident Response War Stories: When MDR Would Have Made the Difference The Managed Detection and Response (MDR) market is heating up as lean security teams lacking the human and financial resources of larger organizations clamor for tools to uncover and stop cyber intrusions more quickly. They understand that when a bad actor penetrates their organization, every second counts. Many have learned this lesson the hard w... More info Cybercast The Three Steps to Cyber Readiness In the face of rising cybersecurity threats, cyber readiness continues to be an urgent matter for every organization. But how do you achieve it? Cyber readiness ultimately involves answering three different questions, each related to a different aspect of cybersecurity. These questions are: (Network understanding) What is the state... More info Cybercast Platform for Platforms: Developing Modern Applications at the Edge Developing applications and web experiences that meet the needs of the modern user is a robust challenge for any organization. Join Fastly’s Travis Sanders, Principal Global Technology Solution Architect, in his discussion of the value of one unified platform for application and website innovation. During this webinar, Travis and Brock will highli... More info Cybercast SaaS data backups: Automated resilience & recovery in the cloud As adoption of software-as-a-service (SaaS) applications skyrockets, cybercriminals understand that the cloud has become a go-to vector for them to illegally access and compromise your data. Through phishing scams, exploits and abuse of misconfigurations, adversaries can steal, modify, encrypt or wipe your valuable SaaS-based assets – resulting... More info Cybercast Passwordless security: Where things stand, and What’s next? Join this webcast to learn about the findings from the 2023 State of Passwordless Security report and how you can use it to improve your organization’s security posture. CRA VP of Content Strategy Bill Brenner, Bojan Simic, HYPR’s Co-founder, CEO and CTO and Andrew Shikiar, Executive Director & CMO, FIDO Alliance discuss key tak... More info Cybercast Reducing risk with user access review automation The ultimate goal of User Access Reviews is to reduce security risk by ensuring that all access within an organization is appropriate and limited to legitimate current use cases. But, as Snowflake grows in terms of employees and systems, performing these reviews quarterly can become time-consuming, cumbersome, and error-prone in the absence of aut... More info Cybercast Practical advice for protecting your digital supply chain: A realistic top 5 list There’s a lot of advice out there for how to secure the hardware, firmware and software that encompasses your company’s digital supply chain. But not all of it is immediately feasible for everyone, especially for organizations that are limited in resources or lacking security maturity. Fortunately, this webcast will make sense of this c... More info Cybercast The Latest Cybercriminal TTPs: How Public-Sector Defenders Can Stay Ahead Cybersecurity is a pressing issue for public-sector organizations in the US, as they face the challenge of sorting through a vast amount of cyber threat intelligence while operating with limited resources and a shortage of skilled infosec professionals. The consequences of a successful attack can be devastating, highlighting the importance of prio... More info Cybercast Generative AI: Understanding the AppSec risks and how DAST can mitigate them Generative AI tools such as GitHub Copilot and ChatGPT seem to hold promise for developers looking to write code more efficiently and find quick answers to programming questions. But especially in these early days, carefree reliance on such tools can introduce a range of issues related to software functionality, licensing, and security. Superficia... More info Democast Evading exploit emergencies: Tanium’s keys to prevention & detection One of the most preventable causes of malicious exploits that result in damaging breaches or malware attacks is the failure to update known software vulnerabilities. Ideally, your organization is vigilant enough to patch these flaws as soon as they are publicly divulged. But if one does slip through the cracks and becomes exploited, you at least w... More info Cybercast How IT Risk Translates into Enterprise Risk How IT risk translates into enterprise risk, and how we tie the two together. What is IT risk? How has the definition shifted over the years as it relates to overall enterprise risk?What are key drivers of IT risk on a business today?How do you quantify and communicate IT risk in a tangible way? Why IT should be seen as an enabler, rather... More info Cybercast Playing network traffic cop in multi-cloud environments: A guide to detecting & restricting lateral movement The latest snapshot of your network traffic logs may look innocent enough, but hidden amongst your daily activity are the movements of a cybercriminal adversary who has secretly breached your systems and is now trying to expand its foothold within your virtual walls in multi-cloud environments. It’s this east-west infiltration that turns ... More info Cybercast How Ransomware has disrupted the Cyber Insurance market, And what you can do about it! The cost of cyber insurance is skyrocketing. In response to a string of high-profile attacks, record-setting ransomware numbers and government regulations, insurers are being forced to significantly increase premiums for cyber coverage. Meanwhile, it’s getting even harder for companies to qualify for coverage in the first place, as cyber insurance... More info Cybercast Multi-factor authentication, sans passwords: The path forward Despite their unavoidable flaws, most organizations still require both employees and customers to use passwords. Yet passwordless solutions are both demonstrably more secure and readily available. The question for organizations looking to ditch passwords: Where to begin? This SC Media webcast with HYPR’s Michael Rothschild will address the path to... More info Cybercast Bolstering customer account security without diminishing privacy Identity authentication is a critical tool in the fight against fraud, especially as malicious attackers steal consumer credentials in an attempt to take over their online accounts. But it’s also important to ensure that having these safeguards in place doesn’t negatively downgrade the customer experience or violate an individual’s privacy. Otherw... More info Cybercast Stay Ready so you don’t need to Get Ready The threat landscape seems to be moving at such an accelerated pace these days. The constantly moving targets and ever-expanding threat landscape is a reality that we as leaders need to not only deal with but find ways to get out ahead of. Today and from our time in the field, we want to impart some practical ways that we have seen work to help o... More info Cybercast 2023 CISO Cybersecurity Priorities Every year brings new challenges in protecting our companies and nations from threat actors. Join our live conversation with key CISOs as we look back at 2022 and review some of the key learnings, and look ahead with a laser focus on 2023 priorities for cybersecurity. Speakers: Todd FitzgeraldVP, Cybersecurity StrategyCybersecurity Co... More info Cybercast Beyond basic security compliance: Using automation to build advanced workflows We’ve heard it before: Achieving minimal compliance with security standards or frameworks isn’t enough to protect yourself from today’s threats. Basic compliance needs to be a starting point – a core building block upon which you must continually improve and scale your security processes. With limited resources, staffing, and funding inhibiting... More info Cybercast Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts The traditional security monitoring architecture has been troubling security teams with data silos, performance issues, and delays in retrieving archived data for years. Many analysts who continue to operate with the antiquated SIEM architecture stack also experience a high volume of alerts—with many false positives. Luckily, the internal security... More info Cybercast Stemming the rising tide of fraud with machine learning and AI Today, successful fraud attempts outnumber those stopped, causing security and risk experts to wonder: How can we turn the tide? The answer lies in machine learning (ML) and artificial intelligence (AI) technologies, which ingest and understand vast historical data to identify fraudulent patterns and suspicious transactions. This webcast... More info Democast Consolidating without compromise: An XDR democast for analysts of all tenure Organizations have more security concerns than ever before (due to an increasingly volatile threat landscape, growing attack surfaces, and increased volume and complexity of security threats and alerts) and security operations will continue to be difficult for many organizations to effectively combat without the right combination of technology, in... More info Cybercast Busting Bots: How to Go Beyond Traditional CAPTCHA With Machine Learning Bots are pesky, ill-natured, and often spiteful programs. Their capabilities constantly evolve in order to elude online defenses and take over consumer accounts. Advanced bot operations use malicious plug-ins, bot farms, and artificial intelligence to bypass and solve traditional CAPTCHA mechanisms. Ironically, traditional CAPTCHAs are often more ... More info Democast Dr. DevSecOps: A prescription for alleviating AppSec’s biggest pain points Secure application development can be a painstaking process, but just how painful does DevSecOps actually need to be? Companies that are actively engaged in DevSecOps speak of multiple pain points, from struggles with asset visibility and discovery to finding ways to close every gap in their defenses. Along the way, they face an uphill battle t... More info Cybercast CISO Thought Leadership: Becoming a Trusted Partner CISOs are the most sophisticated buyer in the technology industry. Successful engagement with these executives requires a nuanced communication strategy that blends technology, strategic, and leadership content. Above all, solution providers must establish themselves as trusted partners whose primary mission is the safety and security of their cus... More info Cybercast EMOTET Exposed: Inside the Cybercriminals’ Supply Chain New analysis from VMware delves deep into the most recent waves of the Emotet botnet, providing never-before-seen insights into the malware delivery mechanism’s malicious components and modules, its execution chains and its software development lifecycle. This webcast will reveal key findings and takeaways from VMware’s researchers, who mana... More info Cybercast Securing – not banning – your employees’ favorite SaaS apps The growing number of cloud-based SaaS applications that employees are using to conduct their day-to-day business is dramatically expanding their companies’ attack surface. And malicious actors are increasingly infiltrating networks by compromising weak credentials used across various cloud applications. The initial knee-jerk reaction among sec... More info -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies