CybercastAttendees will walk away with:
A clear understanding of emerging identity security threats – Learn how deepfakes, adversarial AI, and evolving attack methods are reshaping the threat landscape in 2025.
Actionable strategies to close identity security gaps – Discover key steps to strengthen access controls, mitigate credential-based attacks, and adapt to market shifts.
Insights into industry trends and future innovations – Gain expert perspectives on how major identity players are evolving, including the impact of mergers, acquisitions, and new security technologies.
More info Cybercast
Spotting Security Debt Before It Grows: Understand where security debt hides in your systems and how it quietly stacks up over time.
Tackling What Matters Most: Get practical tips for prioritizing the vulnerabilities that pose the biggest risk to your organization’s security.
Enable the Business: Avoid paying a high reporting tax, transforming your security program from a technical cost center into a strategic business enabler.
More info Cybercast
Organizations must adopt strategies beyond technology to incorporate the human element to impact cybersecurity outcomes. This webinar will explore how robust organizational culture initiatives, diverse perspectives, and streamlined processes for managing risk can elevate your cybersecurity strategy. Designed for CISOs and cybersecurity professiona...
More info Cybercast
Understand the critical role of tabletop exercises in identifying vulnerabilities and refining incident response strategies.
Learn how to enhance team coordination and response times through effective incident response drills.
Discover best practices for preparing your organization to handle real-world cyberattacks effectively.
More info Cybercast
Gain insights into how a perimeter-less network reshapes security practices and the common challenges it presents.
Learn the role of zero-trust architecture in securing today’s dispersed environments.
Discover the latest technologies and strategies for protecting against modern threats.
More info CybercastGenerative AI presents transformative opportunities for innovation, but it also brings complex security challenges that CISOs must address without compromising business objectives. In this webinar, we will unveil the CISO Resource Toolkit on Generative AI and discuss strategies for harmonizing business goals with robust cybersecurity practices. Learn how to balance innovation with risk management, align AI-driven initiatives with organizational priorities, and foster collaboration across business units. Discover actionable insights to empower your leadership and ensure that security remains a business enabler, not a barrier, in an evolving digital landscape.
More info Cybercast
Understand the risks associated with over-permissioned accounts leading to potential exposure of sensitive data.
Learn about data and identity governance controls to mitigate over-permissioning issues.
Discover methods to continuously assess and improve your organization’s permissions framework.
More info Cybercast
CyberRisk Collaborative Chief Technologist Dr. Dustin Sachs, cybersecurity expert Bob West, and Olympic Bronze Medalist Shannon Rowbury for an insightful webinar on building a workforce prepared to tackle unexpected challenges. Drawing from their diverse experiences in business and elite athletics, our speakers will share actionable strategies to ...
More info Cybercast
Understand the critical importance of AI governance in cybersecurity.
Learn how to navigate complex regulatory landscapes, including the EU AI Act and NIST AI Risk Management Framework.
Discover strategies to mitigate risks such as ethical violations, security gaps, and reputational damage.
More info Cybercast
Gain actionable guidance on integrating AI to enhance your security posture.
Learn methods to reduce threat response times and boost intelligence with AI.
Discover how to enable effective collaboration between AI tools and human analysts.
More info Cybercast
The SIEM market is undergoing profound transformation and legacy systems often fall short of meeting the demands of today’s security landscape, where cyber threats are more sophisticated, and IT environments are increasingly complex:
Mid-to-large enterprises, especially those with annual revenues of up to $5B, face significant challenges in ma...
More info Cybercast
In an era where global data privacy regulations are evolving faster than ever, security leaders face mounting pressure to balance compliance and data protection. The growing conflict between consumer privacy rights and business transparency demands immediate attention, as failure to navigate these regulatory complexities not only risks severe lega...
More info Cybercast
Ransomware gangs have evolved into corporate-like powerhouses—Ransomware, Inc.—with sophisticated business models and ruthless tactics. As their operations escalate, cybersecurity professionals must stay ahead to combat the next wave of attacks.
This webcast will cover:
How ransomware gangs mimic corporate structures, from Ransomware-as-a-S...
More info Cybercast
Gain a deeper understanding of the complex and often hidden risks within the cloud supply chain
Learn about actionable strategies for identifying, mitigating, and responding to supply chain vulnerabilities
Obtain a heightened awareness of the critical importance of supply chain security in the broader context of cloud computing
More info Cybercast
In the world of cybersecurity, numbers can either light the path to resilience or muddy the waters. Which risks demand your immediate focus? Which business units are hackers most likely to target? And how do you ensure security earns its rightful place among top business priorities?Here’s the real challenge: Where do you begin?It all starts with a...
More info CybercastIn today’s ever-growing tech and cybersecurity landscape, it’s important not to get complacent. Traditional legacy penetration testing often provides a snapshot of vulnerabilities once a year, but what about the risks that emerge as your attack surface evolves? IT infrastructures shift, new code is deployed, and threat actors continuously adapt. That’s where continuous penetration testing comes in.
More info Cybercast
With third-party risks increasingly impacting business continuity and security, relying on traditional monitoring approaches is no longer enough. Public data holds critical early-warning signals, but extracting actionable insights from public data in real-time can be overwhelming. That’s where AI comes in. In this webcast, we’ll discuss:
Why Th...
More info Cybercast
This year’s spate of high-profile supply chain failures has pointed out how interconnected and vulnerable the ecosystem is and blurred the line between security and business resiliency. In this webcast, CISOs grapple with how to better understand your business value chain, what the CISO’s role should be to ensure security and operational continuit...
More info Cybercast
As the digital landscape expands, managing and securing the attack surface of your organization has never been more crucial. Join us for a hot topics webcast where industry experts will provide a comprehensive forecast of attack surface management (ASM) trends and offer strategic guidance for late 2024 and early 2025. This session will cover emerg...
More info Cybercast
Today’s application and cloud security tools aren’t built to protect today’s applications from new and existing risks that AI/ML and GenAI/LLMs introduce. Security teams need a new approach to protect data and AI supply chains.
To that end, this session will explore:
Real-world examples of vulnerabilities, misconfigurations, and malware fo...
More info Cybercast
The complexity of cloud security doesn’t have to weigh down your operations. In this webinar, a panel of CISOs will unveil a unique, lightweight approach to cloud security—focusing on reducing complexity and improving operational efficiency. This new frontier in cloud security emphasizes streamlined, resource-efficient tools and architectures that...
More info Cybercast
Are traditional virtual desktop infrastructures (VDI) holding your organization back? Join us for a forward-thinking webinar that reimagines secure access, bypassing the limitations of VDI to embrace a streamlined, browser-based approach. Discover how Menlo Secure Enterprise Browsing, in partnership with Google Cloud, enables seamless access to es...
More info Cybercast
In today’s fast-paced threat landscape, organizations are increasingly challenged by the frequency and complexity of attacks, particularly zero-day vulnerabilities, that demand swift and strategic responses. Third-party risk management (TPRM) teams are often caught off guard, scrambling to mitigate risk while navigating a growing ecosystem of vend...
More info Cybercast
As cyber threats grow increasingly sophisticated, threat hunting has emerged as a critical defense measure. This session will provide actionable insights into the latest threat-hunting trends, advanced techniques, and innovative solutions to stay ahead of attackers in late 2024 and 2025.
Participants will learn how to shift from passive intelli...
More info Cybercast
Streamline Third-Party Risk Assessments: Learn how adopting the “ask once, use many” approach through risk exchanges reduces redundancy and improves efficiency in due diligence processes.
Enhance Risk Management Effectiveness: Discover practical strategies to identify and mitigate real risks, enabling CISOs to focus on strategic priorities instead of repetitive tasks.
Leverage Risk Exchange Benefits: Understand how third-party risk exchanges can simplify collaboration, increase transparency, and maintain thoroughness without overburdening resources.
More info Cybercast
In today’s digital landscape, organizations are increasingly relying on cloud infrastructure to support their operations. Experts from both companies will discuss best practices for designing a robust cloud architecture that prioritizes security without sacrificing performance. Attendees will gain insights into:
Best practices for designing a ...
More info Cybercast
The contemporary enterprise is seeing a proliferation of new identities across the board, with increasingly complex and diverse environments. At the same time, we’re seeing new attack vectors, often fueled by AI, increase the risk of those identities and environments. Securing against these attacks without introducing unnecessary friction for work...
More info Cybercast
With the rise in advanced persistent threats (APTs) and increased regulatory pressure, security teams face the challenge of ensuring compliance while maintaining a resilient cybersecurity posture. Hear from security experts at ePlus who will provide an overview of the current cybersecurity challenges in commercial markets and the hurdles customers...
More info Cybercast
Generative AI like Microsoft Copilot has the potential to revolutionize productivity, but security teams are rightly concerned about the risks of deploying it at scale.This webcast is for organizations looking to roll out Copilot without adding risk to data.
The Challenge: Many organizations are eager to adopt Copilot but are held back by data...
More info Cybercast
Security teams today are inundated with data but lack actionable insights. The rise of public data sources—ranging from social media and blogs to leaked databases and dark web forums—offers new opportunities for real-time threat detection and risk management. But with this wealth of information come significant challenges: noisy data, false positi...
More info Cybercast
Today’s digital enterprises face an explosion of applications, users, and environments—creating fragmented and siloed identity systems that are vulnerable to attacks. This webcast explores how leading organizations are consolidating their IAM infrastructure to create a unified and agile approach that keeps pace with digital complexity. Discover ho...
More info Cybercast
Some of the biggest breaches this year—Snowflake, Dell, UnitedHealth—have a common thread: Attackers exploited gaps in identity management, exposing critical failures in Least Privilege strategies. Is your organization next?
Learn from the experts: Hear firsthand accounts of painful experiences and lessons learned from major breaches.
Achie...
More info Cybercast
In an era where endpoints are frequent targets for cyber attacks, ensuring robust endpoint security is crucial for protecting organizational data and operations. Join us for an essential hot topics webcast where industry experts will provide a comprehensive forecast of endpoint security trends and offer strategic guidance for late 2024 and early 2...
More info Cybercast
Lots of network scanning vendors claim to offer enterprise cryptographic inventory and risk assessment capabilities, but can they provide upfront knowledge into which systems will respond well to the new NIST standard Post Quantum Cryptography (PQC) algorithms and what connectivity and functionality will break when PQCs are introduced to the netwo...
More info Cybercast
In an era where identity is the new perimeter, organizations must strengthen their Identity and Access Management (IAM) strategies to protect against evolving cyber threats. Join our expert panel of CISOs as they unveil cutting-edge tools and actionable guidance designed to enhance IAM capabilities. This webinar will explore best practices for sec...
More info Cybercast
As today’s threats and how we work continue to rapidly evolve, traditional security tools like Multi-Factor Authentication (MFA) and Single Sign-On (SSO) are no longer enough for you to provide truly secure workforce access to applications and information. While foundational, we’ve seen these controls easily bypassed through methods like social en...
More info Cybercast
Innovation is key to staying ahead in cybersecurity, but sometimes chasing the ‘next big thing’ doesn’t lead you to the right destination. While it can seem essential to adopt the latest and greatest in security tech, it may be more practical to focus on tried-and-true tools and methods for ensuring resilience instead. But that approach introduces...
More info Cybercast
As cyber threats continue to evolve, maintaining robust network security is paramount for protecting organizational assets and data. Join us for an insightful hot topics webcast where industry experts will present a comprehensive forecast of network security trends and offer strategic guidance for late 2024 and early 2025. This session will delve ...
More info Cybercast
In today’s lightning-fast business landscape, the stakes for manufacturers have never been higher. The digital transformation driving innovation is also expanding the attack surface at an alarming rate. Outdated legacy systems and the rapid proliferation of smart factories have created a perfect storm of vulnerabilities. CISOs are caught in the cr...
More info Cybercast
As application security (AppSec) continues to be a critical component of cybersecurity, organizations must stay informed about the evolving threats and best practices in this area. Join us for an essential hot topics webcast where leading experts will provide a detailed forecast of the AppSec landscape and offer strategic guidance for late 2024 an...
More info Cybercast
The cybersecurity landscape is constantly evolving, and CISOs are inundated with new tools and technologies, each promising to be the ultimate solution. But what do you really need, and what’s just noise? How can you go beyond the buzz and measure the effectiveness of these tools and avoid common pitfalls? Are you ‘overstacking’ and subjecting you...
More info Cybercast
Third-party identities present both opportunities and risks, opening doors to new business while also posing security challenges. The latest report from S&P Global Market Intelligence, commissioned by Thales, highlights the crucial role of Business-to-Business Identity and Access Management (B2B IAM) in securing the extended enterprise. Legacy...
More info Cybercast
Is Your Browser the Weakest Link in Your Security Chain? Zero Trust has been the gold standard in cybersecurity for over a decade, but most organizations are still struggling to implement it where it matters most: the browser. As more applications move to the web, hackers are exploiting this gap with increasingly sophisticated tactics, leaving tra...
More info Cybercast
Join us for a conversation about the hours that immediately follow a suspected cyber incident. We’ll ditch the buzzwords and jargon and dive into the messy, chaotic reality of incident response. Our 1:1 conversation will include war stories, lessons learned, and the hard-won wisdom gained from leading organizations through the fire. We will pull b...
More info Cybercast
After eight years of submission review, testing, and evaluation, NIST has formally announced the PQC standard specifications, setting in motion the largest cryptographic transition in the history of computing – replacing legacy encryption with PQCs. The multiyear crypto migration is certain to usher in new challenges, uncertainties, and risks. Thi...
More info Cybercast
Like many large organizations, IBM found itself trying to manage a fragmented and inefficient Identity and Access Management (IAM) landscape, riddled with legacy systems that hindered scalability, compliance, and operational efficiency. The company managed to turn things around with help from Saviynt.This webcast will explore how IBM successfully ...
More info Cybercast
As cloud adoption accelerates, securing cloud environments remains a top priority for organizations. Join us for an insightful hot topics webcast where industry experts will provide a comprehensive forecast of cloud security trends and offer strategic guidance for late 2024 and early 2025. This session will cover the latest threats, best practices...
More info Cybercast
As the digital landscape continues to evolve, identity management remains a critical component of cybersecurity strategy. Join us for a timely webcast where leading experts will provide essential guidance on navigating identity challenges and opportunities anticipated in late 2024 and early 2025. This session will explore the latest trends in iden...
More info Cybercast
This month of CISO Stories will look at the findings of a cross-sector task force of CISOs and staff who shared details of their incident management best practices, including incident response plans, playbooks, metrics, and business continuity plans.
The Incident Management Best Practices Guide presents a framework and components for the incide...
More info Cybercast
CISOs today face the daunting task of managing a myriad of vulnerabilities and misconfigurations within their organizations’ IT infrastructures. Join us as we explore strategies for differentiating and addressing vulnerabilities versus misconfigurations, ensuring that the most pressing risks are mitigated promptly. We will discuss best practices f...
More info Cybercast
Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary to leaking Personally Identifiable Information (...
More info Cybercast
Ransomware attacks continue to evolve, presenting ever-increasing threats to organizations worldwide. Join us for an in-depth hot topics webcast where industry experts will delve into the latest ransomware trends and provide actionable guidance to navigate the challenges anticipated in the latter half of 2024 and early 2025. This comprehensive ses...
More info Cybercast
Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats. The incident response challenge is further complicated as enterprises rapidly deploy cloud and container-based technologies and embrace a multi-cloud strategy. A n...
More info CybercastJoin us for a crucial webcast addressing the pivotal cloud security priorities that will define the second half of 2024. As organizations continue to embrace cloud technologies, the landscape of cloud security evolves at an unprecedented pace. Our expert panel will delve into the strategic imperatives crucial for securing cloud environments in the coming months. Explore topics ranging from the latest advancements in cloud security technologies to compliance considerations and proactive risk management strategies. Whether you’re migrating to the cloud or optimizing existing cloud infrastructure, this webcast will provide actionable insights to fortify your organization against evolving cyber threats.
More info Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer and Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will delve into the pivotal ro...
More info CybercastVulnerability management remains an uphill challenge for security teams. In this month of CISO Stories, we look at the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics include:
Managing vulnerabilities on premises, in the cloud, and in third-party environments
Identification, classification, prioritization, and remediation best practices
Standards and charters
Organizational structures
Scanning tools.
Supporting tools to be shared include a CISO’s Guide to Effective Vulnerabilities; and a Vulnerability Management Maturity Checklist.
Practitioners will also connect the dots on how effective vulnerability management can be used to continuously improve identity, application, cloud and network security, anti-ransomware efforts, zero trust, email security, threat intelligence, AI and third-party risk management.
More info Cybercast
Siloed identity tools and legacy complexity are the enemies of a modern identity program. There is a growing interest in tool convergence – specifically IGA and PAM convergence. The promise of simplicity, efficiency, improved security, and enhanced governance is appealing and can help protect identities from deepfakes and other AI-based threats. B...
More info Cybercast
A robust GRC program fosters the ability to manage key risks and protect sensitive data, aligning security initiatives with organizational objectives; and ultimately allows the CISO to establish trust and confidence with key stakeholders. However, the constantly evolving regulatory landscape is resource intensive to manage and requires striking a ...
More info CybercastThe next generation of cybersecurity solutions is built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics and more, and it’s delivered where security teams already work. Security leaders at leading enterprises are building their security program with Snowflake. When security applications are plugged into the security data lake in Snowflake, the apps are able to leverage data and insights to make better correlations. In this webinar, we will discuss:
How to leverage Snowflake as a security data lake and its ecosystem of cyber apps
Efficient strategies for building detection and vulnerability management security programs with Snowflake cyber apps
How customers like Xactly leverage Snowflake’s growing ecosystem of apps to derive value in less than 6 months
How Xactly thinks about their cyber mesh architecture for building scalable security program
More info Cybercast
Key objectives of a governance, risk, and compliance program (GRC) are to ensure that the cybersecurity program has appropriate oversight, identifies and addresses cyber risks, and complies with all applicable laws and regulations. GRC functions shape cybersecurity program components and its principal functions to reduce risk and meet all complian...
More info Cybercast
As organizations navigate the dynamic landscape of governance, risk, and compliance (GRC), join our webcast to explore the critical priorities that will shape the second half of 2024. In an environment marked by evolving regulations, heightened cyber threats, and a rapidly changing business landscape, staying ahead of GRC challenges is paramount. ...
More info Cybercast
Determining the most relevant cybersecurity metrics has long been discussed, but as high-profile attacks and regulatory scrutiny increases, effectively monitoring the progress and continued risk in a security program is paramount. In this panel, CISOs share their challenges and experiences implementing and expanding a metrics program and offer ins...
More info Cybercast
Most conversations around Identity Resilience focus on the prevention of attacks. But as statistics increasingly show that a major breach is a matter of “when”, not “if”, CISOs are realizing that their Identity Resilience strategy is missing a critical piece: response. In this conversation, we’ll explore Identity Resilience from the lens of Busine...
More info Cybercast
In the ever-evolving landscape of cyber threats, organizations are sitting on a goldmine of untapped potential within their existing security infrastructure. Our expert panel will guide you through innovative strategies to leverage your current tools for enhanced threat intelligence capabilities. Discover practical insights on optimizing SIEMs, le...
More info Cybercast
As cyber threats continue to evolve, security teams are constantly challenged with the task of fortifying their organization’s defenses against a myriad of potential vulnerabilities. In this SC Panelcast, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Nathan Wenzler, Chief Security Strategist at Tenable, will delve in...
More info Cybercast
CISOs strive to develop and use security metrics as an objective way to: (1) portray the state of their security programs; and (2) effect positive change to security controls, like patching within SLAs and improving phishing email awareness. However, they are challenged by data collection difficulties, limitations of reporting tools, and uncertain...
More info Cybercast
Amid concerns about data privacy and its ties to the Chinese government, President Biden recently signed a law banning TikTok nationwide unless it is sold, leaving security practitioners with a multitude of questions around the future of mobile app security. This SC Panelcast will explore the ongoing concerns around TikTok, how the potential ban m...
More info Cybercast
The rapid expansion of digital capabilities has moved sensitive data into various ecosystems, creating additional risk and compliance concerns for organizations. In this panel discussion, security leaders share their approach to striking the right balance of protecting data while enabling information sharing and innovation.
The discussion wil...
More info Cybercast
In today’s rapidly evolving threat landscape, enterprises face a daunting challenge: phishing attacks empowered by artificial intelligence (AI) and readily available phishing toolkits. Join this webinar to learn about the latest phishing trends, tactics, and predictions revealed in the Zscaler ThreatLabz 2024 Phishing Report. Experts from ThreatLa...
More info Cybercast
In this webcast, we unravel the insights and implications behind the latest global AI security guidelines, distilling complex recommendations into four key takeaways that every cybersecurity professional should know. As nations grapple with the rapid adoption of artificial intelligence, regulatory bodies worldwide have collaboratively devised comp...
More info Cybercast
AI is fundamentally changing how software is written. Developers are increasingly relying on code generated by leveraging generative AI tools and application security experts are scrambling to understand and mitigate security risks. To counteract this emerging threat, the developer community must take proactive measures and foster a culture of con...
More info Cybercast
By operating Records & Information Management (RIM) functions, data security and lifecycle management practices have been employed by organizations even before computing became the norm. However, these practices are continually stretched to keep pace with new technologies, like AI, which can pose threats to data confidentiality and integrity ...
More info Cybercast
It’s not rocket science, it’s network security. And yet for many organizations, the road to securing employees and information often results in trade-offs to performance, agility, scalable services, and user experience. While first-generation SASE solutions promised companies a way out of this complexity, those early deployments failed to resolve ...
More info Cybercast
The unique characteristics of OT systems – legacy equipment, long lifecycles, and the convergence with IT networks – complicates deploying traditional security approaches. And these inherent weaknesses in OT environments create a low-hanging and potentially lucrative target for threat actors, making it critical that security teams take steps to en...
More info Cybercast
Identity and Access Management (IAM) solutions are no longer just ways to provide easy workforce access to applications, but critical tools in security and zero trust network access, creating the first line of defense against malicious actors and insider threats. In this panel discussion, experts from CyberRisk Alliance and CyberArk will share the...
More info Cybercast
Cybersecurity tools, especially those experienced by end users, are often seen as blockers – built to create friction. We have been trained to believe that there must be a trade–off between security and user experience. If we are too strict users go around or just complain! Too lenient and we leave gaps for attackers to exploit. What if we begin t...
More info Cybercast
As traditional security paradigms falter in the face of sophisticated cyber threats, zero trust emerges as a beacon of resilience. Join our expert panel for an in-depth exploration of the evolving landscape of zero trust, where strict identity verification is paramount, and the concept of assumed trust is fundamentally challenged. Gain valuable in...
More info Cybercast
In the digital age, identity serves as both a shield and a sword in the realm of cybersecurity. Statistics reveal that 74% of breaches stem from the human element, highlighting the paradoxical nature of identity in the cyber era. This panel explores the interplay between social engineering and technological sophistication to detect these Identity ...
More info Cybercast
Securing Operational Technology is a challenge for many organizations that depend on the continual availability of ICS/SCADA systems to manufacture their products. For example, maintenance windows for security patches are often hard to find and raise concerns about ““breaking”” systems. Furthermore, OT systems require Internet access and, therefor...
More info Cybercast
Managing the scope and complexity of third-party relationships can be a highly manual, time-consuming task for many security teams, and even after this effort effectively mitigating supply chain vulnerabilities remains one of the greatest threats to an organization’s security. In this panel discussion, security leaders share current approaches, ch...
More info