Remove resources webinars
article thumbnail

Chasing Ghosts: Automating Malware Triage to Reduce EDR False Positives

Data Breach Today

The Ups and Downs of EDR and XDR Deployments In this webinar recording, learn how VMRay reduces false positives in EDR and XDR, saving resources and addressing analyst burnout while calculating the annual cost of false positives for your organization.

282
282
article thumbnail

Webinar | 4 Actions to Secure Work from Home Employees

Data Breach Today

IT resources are being stretched to mobilize an urgent shift to remote access and remote work. This informational webinar will outline 4 actions you can take today to keep employees secure and productive during these challenging times, with tips straight from your identity and access management peers.

Security 227
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disposition 101 Webinar Now Available

The Texas Record

We are very excited to announce the newly revamped Disposition 101 webinar, which is now available on our website along with several other free records management webinars and supplemental resources. Check out the Disposition 101 webinar page for the video recording, handouts and a certificate of completion.

article thumbnail

Live Webinar | Automate Threat Hunting with Security Analytics & Machine Learning

Data Breach Today

Meanwhile, individual tools including DLP, EDR, CASBs, email security and advanced threat protection are only designed to identify individual elements of a campaign, putting the onus on human analysts to piece together the bigger picture - when time and resources allow. Addressing DLP, EDR and Email Security use cases;

Analytics 219
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

The end result is the ability to streamline your allocation of capital and resources. In this webinar, you will learn how to: Outline popular change management models and processes. Organize ERM strategy, operations, and data. Determine impact tangents. Practice change management process with ERM data.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Data Governance Maturity and Tracking Progress

erwin

erwin recently hosted the third in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. Led by Frank Pörschmann of iDIGMA GmbH, an IT industry veteran and data governance strategist, this latest webinar focused on “ Data Governance Maturity & Tracking Progress.”.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

In this webinar, you will learn: How to shift left with the security team supporting developers? How a belief that DevOps resources are jack of all trades can increase your risks, not lessen. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.