Resources (13)

  1. Securing Your Organization’s Human Layer

    The intersection between technology and human security is a difficult challenge for any organization to tackle, and although detection technologies are advancing, criminals are rapidly evolving their techniques and tactics to even greater levels of sophistication. Their attacks are difficult to detect, and even security administrators themselves fall victim. Join Perry Carpenter, Chief Evang… Learn More

    • Data Protection
    • Ransomware
    • Security
  2. Ransomware Hostage Rescue Guide

    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Secur… Learn More

    • Data Protection
    • Security
  3. Decoupling Security Segmentation from Networking for Effective PCI Compliance

    Maintaining your PCI compliance posture is hard. Are the changes in your environment leading to segmentation errors? Is your QSA questioning the correctness and completeness of your PCI scope and segmentation? Have you tried to deploy more VLANs and data center firewalls to segment your PCI environment, and FAILED? In this webinar, Illumio’s Vivian Tero will share how customers can use Illumi… Learn More

    • Security
  4. Achieving Zero Trust with Zero Fuss

    Enterprises struggling with increasingly complex infrastructure are turning to Zero Trust as a common security model for ensuring consistent security across environments. In fact, Forrester recently concluded that organizations using Zero Trust can mitigate risk by 37% and reduce security costs by more than 30%, potentially saving millions in their overall IT security budgets. In this webinar,… Learn More

    • Data Protection
    • Networking
    • Security
  5. Simulated Phishing and Awareness Training

    Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users.… Learn More

    • Data Protection
    • Security
  6. Why Microsoft's Office 365 Latest Data Protection Enhancements Aren’t Enough

    Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. The latest Microsoft data protection enhancements can restore a few emails or files, but if you’re looking for a large recovery, you’ll need to turn to a third-party solution. Learn More

    • Data Protection
    • Security
    • Storage
  7. Paying the “Inaction Tax”: The Cost of Status Quo Security

    Securing the perimeter is no longer enough to prevent breaches. Numerous regulations, such as PCI and SWIFT, now deal with data security and mandate segmenting your applications. If you’re looking to build a business case for securing your high value applications, tune in and take notes. Learn More

    • Security
  8. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  9. Audience Q&A Event: Securing the Human Layer

    It’s common knowledge that humans are the leading cause of IT security incidents.  Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident. You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of securi… Learn More

    • Cloud
    • Security
  10. CEO Email Fraud - $5.3 Billion Mistake You Can’t Afford to Make!

    CEO fraud, also known as Business Email Compromise (BEC) has victimized more than 22,000 organizations and is responsible for over $5.3 billion in losses. Despite these statistics, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Join David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Security
  11. Ransomware Hostage Rescue Guide - Continued

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Join ActualTech Media's David Davis and Erich Kron… Learn More

    • Security
  12. Ransomware Hostage Rescue Guide

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. Join ActualTech Media's David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar “Ransomware Hostage Rescue Guide”. We will look at scary feature… Learn More

    • Security
  13. Surviving Social Engineering & Ransomware

    Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses. Get insight into what your organization needs to know about these attack vectors. Join David Davis, Partner at ActualTech Media and Erich Kron, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Data Protection
    • Security