Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Selecting the right cybersecurity framework for your organization

The rise in cyberattacks and data breaches demands organizations to implement a well-structured cybersecurity framework. Cybersecurity frameworks provide a set of best practices that organizations should follow to minimize their cyber risk. There are countless cybersecurity frameworks available for organizations to implement. This is why choosing the best framework for your organization can be difficult. Moreover, many mandatory industry and compliance regulations have cross-reference to various cybersecurity frameworks. Understanding the similarities and differences across the common security frameworks can help you create a more robust cybersecurity compliance program for your organization.

Lookout CASB Protects Sensitive Data in Slack by Masking data and Watermarking

This video illustrates how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data in chat and masking that data so that it is not shared in plain text. This video also shows how Lookout applies a watermark to sensitive content allowing addition policy actions to be applied.

Zero Trust? Don't Forget Your Mobile Fleet

Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users connecting to corporate data. Speakers: Tomas Maldonado - CISO, NFL Ramy Houssaini - Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas

Secure your infrastructure from code to cloud

Infrastructure as Code enables you to take ownership of your cloud environments and define what your application needs in a programmatic way. It's appealing because it’s code; you can version it, you can automate testing it using pipelines and you can deploy it frequently on your own. However there is a catch. With this level of autonomy comes increased responsibility and the implicit requirement to have the relevant knowledge needed in order to design and configure secure infrastructure.