Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Mitigating Risks in Software Supply Chain

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, require organizations to take action to ensure the security and integrity of their software. But this is easier said than done.

Are We Forever Doomed By Software Supply Chain Risks?

The adoption of open-source software continues to grow and creates significant security concerns for everything from software supply chain attacks in language ecosystem registries to cloud-native application security concerns. In this session, we will explore how developers are targeted as a vehicle for malware distribution, how immensely we depend on open-source maintainers to release timely security fixes, and how the race to the cloud creates new security concerns for developers to cope with, as computing resources turn into infrastructure as code.

Strategies For Vendor Third Party Risk Management

Vendor Third-Party Risk Management is an essential part of most regulatory and compliance programs. Tracking and monitoring vendor risk are important as it helps businesses make critical business decisions and mitigate risk from time to time. As organizations mostly outsource some parts of their operations to vendors or third-party service providers, it has become mandatory in certain standards and regulations to establish Vendor third-party risk management as a part of the compliance process.

5 Critical Cybersecurity Strategies for Remote Work Environments

Accommodating the sudden and massive increase in remote work environments raises major cybersecurity and logistics challenges, for every sized business in every industry. Even organizations that have an existing remote work infrastructure will need to scale it and protect it more than ever - and quickly. In this webinar, Keeper CEO and Co-founder, Darren Guccione, will explain how organizations can maintain robust cybersecurity while the majority of the global workforce works from home or other remote locations.

How to Mitigate the Risk of Ransomware Attacks

Ransomware attacks are rapidly increasing in frequency and cost. According to security experts, ransomware was a $20 billion industry in 2021, with an attack happening every 11 seconds according to Cybersecurity Ventures. Organizations victimized by these attacks can lose access to their networks and data, incur steep financial losses, and suffer significant reputation damage. Watch our on-demand webinar of world-renowned cybersecurity expert Dr. Eric Cole and Keeper CEO Darren Guccione for a forward-looking conversation around.

Webinar: Top Security Threats Worldwide: Q3 2021 - 18 Jan 2022

Join WatchGuard CSO Corey Nachreiner and Security Operations Manager Marc Laliberte as they discuss key findings from the latest Internet Security Report from the WatchGuard Threat Lab. Fueled by the Firebox Feed, threat intelligence gathered from WatchGuard Firebox customers who have opted-in to sharing adversarial data, the report highlights the latest malware, network attacks and malicious domains targeting small and midmarket enterprises.

Webinar: The Importance of Firewall in a Unified Security Platform - 15 Feb 2022

As our users continue to connect from remote locations, it may seem as if the core network protections provided by a firewall are less important. No matter where your users connect, effective protection for your organization requires extending the capabilities of the network beyond your traditional perimeter. Learn how integrating your firewall into a larger Unified Security Platform can improve accuracy, reduce time to detection, and keep your organizations safe from attacks that exploit remote connectivity.

CMMC Town Hall With Bill Walter, DHG & Eric Crusius, Holland & Knight | 3/2/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.