Live and OnDemand Webinars

Live Webinars

Stay tuned for more upcoming Live Webinars!


On Demand Webinars

Endpoint Threat Prevention, Detection & Response

Defining Requirements for Industry-Leading Endpoint Threat Detection and Response

6 Critical Components to Definitive Threat Intelligence

Zero-Day Defense: The Power of Actionable Threat Intelligence and Continuous Endpoint Data Collection

Building a Sophisticated Endpoint Defense Strategy with Full Security Lifecycle Protection

Running Windows Server 2003 in a Post-Support World

Building Resiliency: Proactive Measures to Thwart and Overcome a Cyber Attack
(note: this link leads to slides from the webinar, not a pre-recorded video)

Critical Care – The State of Endpoint Security in the Healthcare Enterprise

Automation in the Incident Response Process

Comprehensive Advanced Threat Defense

Who’s Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and Response

Solving Windows 2003 EOL Security Risks: Migration Strategies and Compensating Controls for Beyond July 14, 2015

Leveraging Threat Intelligence in Incident Management

Threat Intelligence: Real-Time Breach Discovery

Gaining Defense-In-Depth on the Endpoint — Is Antivirus Enough?

Implementing a Security Maturity Framework: 5 Levels to Improving Your SOC

Prepare for the Breach: Detect, Respond and Disrupt at the Moment of Compromise

Accelerate Endpoint Threat Discovery with Automated and Comprehensive Threat Intel

Get Smart – Consuming Threat Intelligence to Advance your Cyber Security Program

Establish Cyber Resiliency: Developing a Continuous Response Architecture

Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Organization

Endpoint Threat Detection Response and Prevention for Dummies

The Modern Incident Responder: Detect, Respond and Recover from a Data Breach

Life After a Data Breach

New Incident Response Model Enables Rapid Response to Advanced Attacks

Designing an Adaptive Security Architecture to Protect Against Advanced Threats

The Failure of Traditional Endpoint Protection: How to Defend Your Devices from Advanced Threats

How to Prevent a Massive Data Breach Disaster

Malware Analysis and the Endpoint: The Power of WildFire on Every Device

Incident Response

Endpoint Security: Defense in Depth and Improved Analytics

Malware Detection Comes of Age

Cracking the Endpoint: Inside the Head of a Hacker

Mitigating Java Vulnerabilities in Your Enterprise

The 2013 Cyber Security Study Results

Bridging the gap between network and endpoint security

Allies in Battle: When the next-gen network and endpoint solutions…

Combat Advanced Threats with the Next-Generation Threat Protection

Closing the Mac Security Gap in your Enterprise

Digital Forensics in Modern Times: A SANS Survey

Converging Endpoint and Network Data Analysis for Improved Visibility and Control

Why Your Current Endpoint Security is Doomed to Fail

APT Confidential: 14 Lessons Learned From Real Attacks

Today’s Advanced Threats Require Next-Generation Protection

Next Generation Network and Endpoint Security

Security Compliance

Preparing for the 2015 Holiday Threat Season

Compliance 101: Basics for IT Security Professionals

Patient Healthcare Data is Under Constant Attack

Point of Sale Security 2015 Mid Year Health Assessment

Practical Security Control Mapping For Financial Services Organizations

Practical Security Control Mapping to Align with Organizational Audit

Demystifying Security Controls for IT Risk

How to Reduce the Complexity of PCI Assessments

In the Crosshairs: Locking Down Point of Sale Systems

Tactics and Strategies for Protecting Customer Payment Information

The Threat of Aging Retail IT Systems

Support for Windows XP: Stay Secure Beyond the End of Life

Keeping Pace with PCI Changes

Integrating Threat Prevention with Bit9 and Check Point

Building Advanced Endpoint Security into the SOC

Demystifying Security Controls for IT Risk & Audit Professionals

How PCI 3.0 Impacts Your Security Posture

5 Ways to Protect Beyond End of Life 0-day Exploits

Data Center Security

A No Worries Guide to Windows Server 2003 End of Life

Overcoming Security Blind Spots in Network, Endpoint and Server Security

Under Attack: Managing Advanced Threats Infiltrating Your Servers

Server Security: A Reality Check

Bit9 + Carbon Black