Three Ways Auditing Can Solidify Your Security Strategy

About this webinar

Recorded: January 29, 2016

According to the Global State of Information Security Survey 2016, the number of security incidents has grown by 38% this year. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

Watch the recorded webcast and learn how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:

  • Security breaches and data leaks in the news and in reality;
  • How auditing complements threat defense mechanisms;
  • What must be audited and why.
Hosted by
Jeff Melnick,
Systems Engineer

Outsmarting Ransomware: Hints and Tricks

Microsoft has been working hard to patch Windows operating systems against the EternalBlue exploit to help shield organizations from threats such as Petya, WannaCry and other ransomware. But as long as employees keep opening phishing emails and clicking inappropriate links, and attackers keep dreaming up new attack vectors, your organization will remain vulnerable to cyber attack. It’s high time to accept that malware will get inside your network one way or another, and do some heavy lifting to shore up your defenses.

Join our webinar and learn:

  • How to implement a least-privilege model and make sure it works, so you can minimize the damage malware can do
  • How to spot possible ransomware activity so you can quickly shut it down
  • How to prepare smart  traps to catch ransomware before it’s too late
  • And more!
24
August
11am EST
24 August, 11am EST
Register Now