Register for Upcoming Webinars
April 23, 2014
01:30 pm EST
Using real-world case studies and findings from over 3 billion analyzed attacks, the NTT Group 2014 Global Threat Intelligence Report (GTIR) demonstrates strategies to minimize threat impact and compress the threat mitigation timeline. Join Rob Kraus and Jon Heimerl along with the moderator Tom Field, ISMG editor, for a lively discussion on the key findings and case studies of the newly released GTIR.
May 28, 2014
12:00 pm EST
Chief Security Strategist Don Gray will discuss how the evolving threat landscape requires organizations to get the basics right, including implementing effective protection from web application attacks, malware and botnets along with the choice and flexibility of Hybrid Security Management.
Hosted by: CISO Executive Network
Webinars On Demand
November 07, 2013
There are few things that are as important as keeping your data secure. The cost of a security breach can be high – not only in terms of money or sensitive data stolen, but in terms of regulatory non-compliance and loss of public reputation. Listen to this webinar for an analysis of the budgetary, operational and security impacts.
September 16, 2013
The question of whether to have a Managed Security Service Provider (MSSP) manage your security infrastructure or purchase a Security Information and Event Management (SIEM) product and manage it yourself, can be difficult to determine on your own. This webcast identifies the pros and cons of an on-premise SIEM and an MSSP approach, as well as provides an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider.
March 21, 2013
Join Solutionary for an in-depth review of the findings from the 2013 SERT Global Threat Intelligence Report including: analysis methodology; real-world case studies; actionable recommendations.
September 28, 2012
Asset Management is a critical component to business. As we become more integrated into the cloud and as we embrace consumerization with open arms, what repercussions will this have on asset management? This session will explore how we manage our assets in the cloud amongst a growing culture of consumerization.
This webinar is hosted by ISSA.
June 26, 2012
Listen to the recorded session where Solutionary and SC Magazine discuss how a security foundation built on organizational, infrastructure and external context can elevate the information provided by both “Next Generation” and legacy security devices provides actionable intelligence – the ability to quickly and efficiently make fully informed security decisions.
This webinar was hosted by SC Magazine.
November 30, 2011
A successful security program keeps attackers out while delivering business value. Join Accuvant, Palo Alto Networks and Solutionary for an informative webinar to discuss how adding context to security helps thwart malicious applications and content.
June 14, 2011
APT attacks can have a significant impact on everyone, not just the ultimate targets. Listen to this four-part series to learn what they are, how they affect you, and ways to protect against them.