Register for Upcoming Webinars

The 2014 Global Threat Intelligence Report

April 23, 2014  01:30 pm EST

Using real-world case studies and findings from over 3 billion analyzed attacks, the NTT Group 2014 Global Threat Intelligence Report (GTIR) demonstrates strategies to minimize threat impact and compress the threat mitigation timeline. Join Rob Kraus and Jon Heimerl along with the moderator Tom Field, ISMG editor, for a lively discussion on the key findings and case studies of the newly released GTIR.

Outsourcing Security - the Role of MSSPs

May 28, 2014  12:00 pm EST

Chief Security Strategist Don Gray will discuss how the evolving threat landscape requires organizations to get the basics right, including implementing effective protection from web application attacks, malware and botnets along with the choice and flexibility of Hybrid Security Management. Hosted by: CISO Executive Network

Webinars On Demand

Information Security: Options for Log Monitoring and Threat Detection

November 07, 2013

There are few things that are as important as keeping your data secure. The cost of a security breach can be high – not only in terms of money or sensitive data stolen, but in terms of regulatory non-compliance and loss of public reputation. Listen to this webinar for an analysis of the budgetary, operational and security impacts.

Security Monitoring and Alerting: MSSP vs. SIEM

September 16, 2013

The question of whether to have a Managed Security Service Provider (MSSP) manage your security infrastructure or purchase a Security Information and Event Management (SIEM) product and manage it yourself, can be difficult to determine on your own. This webcast identifies the pros and cons of an on-premise SIEM and an MSSP approach, as well as provides an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider.

2013 Global Threat Intelligence Report Review

March 21, 2013

Join Solutionary for an in-depth review of the findings from the 2013 SERT Global Threat Intelligence Report including: analysis methodology; real-world case studies; actionable recommendations.

Asset Management in a Consumerized World

September 28, 2012

Asset Management is a critical component to business. As we become more integrated into the cloud and as we embrace consumerization with open arms, what repercussions will this have on asset management? This session will explore how we manage our assets in the cloud amongst a growing culture of consumerization. This webinar is hosted by ISSA.

Contextual Security Provides Actionable Intelligence

June 26, 2012

Listen to the recorded session where Solutionary and SC Magazine discuss how a security foundation built on organizational, infrastructure and external context can elevate the information provided by both “Next Generation” and legacy security devices provides actionable intelligence – the ability to quickly and efficiently make fully informed security decisions. This webinar was hosted by SC Magazine.

Enhancing Security with Application Control and Context

November 30, 2011

A successful security program keeps attackers out while delivering business value. Join Accuvant, Palo Alto Networks and Solutionary for an informative webinar to discuss how adding context to security helps thwart malicious applications and content.

Advanced Persistent Threat Series

June 14, 2011

APT attacks can have a significant impact on everyone, not just the ultimate targets. Listen to this four-part series to learn what they are, how they affect you, and ways to protect against them.