Ever been in these social engineering situations?

You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...

How to respond to ransomware threats

It all depends upon your level of risk and how badly you want the data returned to you unharmed. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...

Cloud Survival Guide: 3 Tips For CISOs

To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene. We’re undergoing one of the biggest transformational changes in IT since the introduction of the...

Security spring cleaning time

As new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and...
How to Survive the Top Ten Cybersecurity Risks of 2016

How to Survive the Top Ten Cybersecurity Risks of 2016

2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
Payment Card Industry Security and Compliance Round Table

Payment Card Industry Security and Compliance Round Table

Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We’ll dive into a...
You’ve been hacked. Now it’s time for “Plan B”

You’ve been hacked. Now it’s time for “Plan B”

With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...
Conquering our Biggest Security Challenges in 2015

Conquering our Biggest Security Challenges in 2015

This webinar features industry cybersecurity experts discussing how they are addressing their biggest security challenges and what’s keeping them up at night. We’ll get practical advice on how they use tools, technologies, and processes to protect their...