Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2024

Ask me Anything Webinar 004

Our Panel of CISOs In this interactive session, a panel of experienced CISOs—Frank D’Arrigo and Bob Chyka—answer pressing cybersecurity questions submitted by the audience. From threat management to security strategies, this session offers direct insights and expert advice from top industry leaders. Watch the recording to gain actionable guidance on protecting your organization, with practical advice on tackling today’s cybersecurity challenges.

Sedara Named to MSSP Alert's 2024 List of Top 250 MSSPs

Sedara Named to MSSP Alert’s 2024 List of Top 250 MSSPs Eighth annual list reveals leading MSSP, MDR and MSP security companies The Top 250 MSSPs for 2024 honorees were announced on October 15 at MSSP Alert Live. The 2024 MSSP Top 250 list reveal marks the first time the list has been unveiled at MSSP Alert’s annual live event. Honorees will also be celebrated at an evening party that coincides with MSSP Alert Live. Sedara was ranked among the Top 250 MSSPs for 2024.

Creative Approaches to Keeping Cybersecurity Awareness Engaging

In this recorded session, we explore innovative methods to make cybersecurity awareness both effective and engaging. Learn how to incorporate interactive training, gamification, real-world scenarios, and creative communication strategies to keep your team informed and vigilant against potential cyber threats. These fresh approaches will help foster a strong culture of security within your organization while keeping employees motivated and actively involved in maintaining cybersecurity.

Common Ways Hackers Break In: Vulnerabilities You Need to Fix

In this webinar, we explored the most common vulnerabilities that cybercriminals exploit to infiltrate systems. Topics included outdated software, weak passwords, misconfigured settings, and unpatched security flaws. We discussed which vulnerabilities pose the greatest risks and shared practical strategies to address them. Watch this recording to gain actionable insights into fortifying your defenses and reducing your organization's attack surface, which will help you stay ahead of potential breaches.

A Guide to Cybersecurity Documentation

The tip of the spear for every cybersecurity program should be a robust set of cybersecurity documentation that defines required activities and expected behavior. For most organizations, cybersecurity documentation includes policies, standards, and procedures, although other kinds, such as regulations and guidelines, may exist as well. The implementation of cybersecurity documentation is a governance control that can lessen risk and comply with legal and regulatory requirements.

Alternative Social Engineering Tactics: Thinking Beyond the Inbox

This webinar explores the evolving landscape of social engineering tactics that go beyond traditional phishing emails. Discover how attackers are leveraging unconventional methods such as social media manipulation, phone-based schemes, and physical infiltration to exploit human vulnerabilities. Learn how to identify and defend against these sophisticated techniques to better protect your organization from emerging threats.