Webinar On-Demand: State of InfoSec Q3 2022

If you missed our recent webinar, State of InfoSec Q3 2022, we now have the full recording available on-demand! ...

Register Now: SOC 2? Who Cares? (And Why You Should)

| | Blog, SOC 2, SOC 2 Compliance, Webinar
Are you pursuing, challenged by, or confused about whether your company needs SOC 2 compliance? Then if you haven’t already done so, make sure you’ve marked your calendar and registered for our ...
Webinar: State of InfoSec Q3 2022

Webinar: State of InfoSec Q3 2022

Are you curious what threats other CISOs are prioritizing right now? Do you know what the most in-demand security talent is right now? Hundreds of Cybersecurity professionals recently responded to MixMode’s nation-wide ...
Video Demo: Add Quantitative Cyber Risk Analysis to a GRC or IRM

Video Demo: Add Quantitative Cyber Risk Analysis to a GRC or IRM

| | Use Cases, Webinar
Watch this webinar for a video demonstration of the seamless integration of the RiskLens platform with a GRC, IRM or other system of record via RiskLens API, with the goal of driving ...

SOC 2 Compliance and Your Cybersecurity: An Everything Compliance Webinar

On August 10, Trustero will present an eye-opening, informative webinar, “Improve Your Cybersecurity with Continuous SOC 2 Compliance.” The featured speaker will be renown cybersecurity industry analyst Richard Stiennon. The post SOC ...
Webinar on Demand: See RiskLens Enterprise Top Risk Reporting in Action

Webinar on Demand: See RiskLens Enterprise Top Risk Reporting in Action

It’s the most popular use case among RiskLens clients for good reason. Top risk reporting is part of launch for any new cyber risk quantification program, and a look into the risk ...
Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning | Webinar

Exploring the 3 Major Threat Detection Methods: Signature, Behavior, Machine Learning

| | 2022, General, Webinar
I kid you not that more than once, it’s been asked, “Which event IDs indicate a security intrusion so I can set up an alert in my SIEM?” If it were only ...
Why Consistent Identities & Policies are Needed in a Multi-cloud World | Webinar

What the Multi-cloud World Needs Now is Consistent Identities & Policies [ESG Webinar]

| | Policy Orchestration, Webinar
The post What the Multi-cloud World Needs Now is Consistent Identities & Policies [ESG Webinar] appeared first on Strata.io ...
The biggest cyber threats among European CSPs

The biggest cyber threats among European CSPs

In the second half of 2021, adware exploded. This is explored in depth in the Allot H2 2021 Cyber Threat Report. The report found that, during the second half of 2021, Allot ...

5 Takeaways From Our Webinar on Cyber Risk with Former BP CEO Bob Dudley

We recently had the rare opportunity to sit down with three cyber-experienced executives offering their views on cybersecurity and how to communicate cyber risk with the C-Suite and Board. Each of our panelists brings a unique perspective to ...