With more sophisticated cyber attacks targeting small and midsized organizations, larger enterprises are now requiring data security assessments prior to doing business. How do you know if you can check the boxes of a 3rd party cybersecurity assessment? Iron Mountain’s VP of Information Security, Seth Bailey, and Jenna Wells, Director of Third Party Risk Management,…
Data Security and Privacy Attorney, Sid Bose, discusses how Managed Service Providers (MSPs) and Integrators can better protect themselves against potential legal issues arising from a cyber incident. In this talk, Sid will review current cases, provide best practice examples, and answer common data security legal questions including: • As I deploy, monitor, and maintain…
Evolved cyber threats impact organizations with limited security resources and staff who can’t manage a complicated (and often expensive) cybersecurity program. So how can these organizations build comprehensive cybersecurity plans, policies, procedures, education, training, scanning, remediation, and more across your entire organization? Rob Simopoulos, 20+ year security veteran and Co-Founder of Defendify, explains how a…
Watch the Replay at Former White House Director of Cybersecurity, and Director of Policy at the National Security Council, Rob Knake, explains how cyber-criminals and state actors have become more capable of, and interested in, targeting businesses of all sizes. Rob will advise non-enterprise businesses, often with 500 employees or less, on the state of…
Enhance visibility and threat detection by providing a single pane of glass for management and configuration with network-based anomaly detection in a SaaS solution.
Manage a consistent posture from your physical network to the cloud all from a single pane of glass.
In this video, we’ll look at a SecureX orchestration sample workflow that automatically deploys a new virtual ASA in Amazon Web Services when an existing ASA has high VPN user load.
In this video, we’ll look at a SecureX orchestration sample workflow that can automatically update Cisco Defense Orchestrator object groups with Microsoft Online networks.
In this video, we’ll look at a SecureX orchestration sample workflow that can automatically update a Cisco ASA’s split tunnel configuration with Microsoft Online networks and domains.
In this video, we’ll look at a SecureX orchestration sample workflow that can use Cisco Orbital to check if managed endpoints are vulnerable to a specific CVE.
With the new email event in SecureX orchestration, you can trigger a workflow when an email arrives in an inbox. In this video, we show how our phishing investigation workflow can take an email submission and conduct an automated investigation.
Cybercriminal tactics are becoming more sophisticated, increasing the risk of a cyberattack for organizations of all sizes. But what happens, from a legal sense, when a cyber breach occurs? Sid Bose, Data Security and Privacy Attorney for Ice Miller, and Rob Simopoulos, 20+ year security expert and Co-Founder of Defendify, discuss how growing organizations can…