24 past events found
Back to Search Begin New Search Save Search Auto-Notify
Getting a Contextual 360-Degree View of...
True business agility and resilience requires you to put your data into context – combining information across domains to answer specific questions and support specific processes. “Getting a Contextual 360-Degree View of the Business” explores benefits and best practices for building a 360-degree view that shifts to meet your current needs in marketing, e-commerce, finance, supply chain management, and more. You will learn ho...
January 20, 2021
Organizer: Informatica
Location: Webcast
Add Favorite
Now That Ransomware Has Gone Nuclear, H...
There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear....
August 18, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Securing Active Directory the Way it Deserves
Credential theft and lateral movement are now regular, everyday tricks of the cyber attacker trade. So it’s imperative that every business secure the foundations of its enterprise access control system: Active Directory. And yet, for many organizations, Active Directory management and security is a major challenge, and they don’t know where to begin. In this webinar, experts will explain the latest AD-related threats and help you g...
August 11, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Why Performance Testing is More Critica...
Now is not the time to let technical issues add more disruptions to your operations. Whether you maintain a high-volume, e-commerce storefront or an application your customers rely on, performance testing can help organizations spot and mitigate potential trouble spots. There are many options available and it is easy to get lost searching for the right solution. In this InformationWeek webinar, experts will help enterprise teams understand wha...
August 6, 2020
Organizer: Informa
Location: Webcast
Add Favorite
The Threat From the Internet – and What...
For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a green field for innovation. But growing use of the Internet is also increasing the risk of cyber attack. In recent years, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to DNS-based exploits to infiltration of commercial websites. And with the world relying more heavily on Web-ba...
June 30, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Preparing For, Detecting, and Managing...
There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as...
June 17, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Building and Managing the Next-Generati...
No matter what your industry or what your organization’s size, there is a growing need to monitor your systems for potential threats – and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this webinar, experts offer insight and recommend...
June 10, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Thinking Like an Attacker: Strategies f...
More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
June 3, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Microsoft Azure Stack with Cisco Webinar
Organizations that use both Microsoft Azure and Microsoft Azure Stack are able to deploy innovative hybrid cloud solutions that enable new services and streamline IT processing costs. Typical applications include edge and disconnected solutions, cloud based apps to meet varied regulations, and apps that leverage both on premise and cloud resources. These scenarios are found within vertical industries, but the application vary to meet specific...
September 5, 2019
Organizer: Informa
Location: Webcast
Add Favorite
How to Detect Cryptomining in your Envi...
Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless yo...
January 30, 2019
Organizer: Informa
Location: Webcast
Add Favorite
Back to Search Begin New Search