Webinars On Demand
Review findings from the NTT Group 2014 Global Threat Intelligence Report (GTIR). The goal of the 2014 GTIR is to raise awareness for executives and security professionals of how to avoid high-profile information security and data breaches, while understanding the needs for a strategic approach to security and offering recommendations to compress the threat mitigation timeline.
There are few things that are as important as keeping your data secure. The cost of a security breach can be high – not only in terms of money or sensitive data stolen, but in terms of regulatory non-compliance and loss of public reputation. Listen to this webinar for an analysis of the budgetary, operational and security impacts.
The question of whether to have a Managed Security Service Provider (MSSP) manage your security infrastructure or purchase a Security Information and Event Management (SIEM) product and manage it yourself, can be difficult to determine on your own. This webcast identifies the pros and cons of an on-premise SIEM and an MSSP approach, as well as provides an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider.
Join Solutionary for an in-depth review of the findings from the 2013 SERT Global Threat Intelligence Report including: analysis methodology; real-world case studies; actionable recommendations.
Asset Management is a critical component to business. As we become more integrated into the cloud and as we embrace consumerization with open arms, what repercussions will this have on asset management? This session will explore how we manage our assets in the cloud amongst a growing culture of consumerization. This webinar is hosted by ISSA.
Listen to the recorded session where Solutionary and SC Magazine discuss how a security foundation built on organizational, infrastructure and external context can elevate the information provided by both “Next Generation” and legacy security devices provides actionable intelligence – the ability to quickly and efficiently make fully informed security decisions. This webinar was hosted by SC Magazine.
A successful security program keeps attackers out while delivering business value. Join Accuvant, Palo Alto Networks and Solutionary for an informative webinar to discuss how adding context to security helps thwart malicious applications and content.
APT attacks can have a significant impact on everyone, not just the ultimate targets. Listen to this four-part series to learn what they are, how they affect you, and ways to protect against them.