91Ƭ

How to Show the Value of the Security Program

IT security is often thought of as a black hole by organization leaders unconvinced of its value. Learn how to demonstrate the value of the security program: combine...

Security Strategy: Mature Your Security Practice With Strategy

Security strategy is about the choices we make to prioritize what we do to better protect our data. A comprehensive and flexible security strategy that mitigates risk is...

Geo-Politics and Privacy: The TikTok Tussle

The United States’ bans on TikTok are a microcosm of the larger tensions between privacy, national security, and global commerce in the digital age. The development and...

Securing the Digital Identity: The Critical Role of Proofpoint's ITDR in Modern Cybersecurity

Proofpoint's Identity Threat Detection and Response (ITDR) solution, known as Identity Threat Defense (ITD), emerges as a beacon of security, offering not just a shield but...

Deepfake-Powered Social Engineering Attacks – What, Me Worry?

Seeing is no longer believing. When it comes to deepfake threats, ensure your people, processes, and tools are adjusted accordingly.

Threats of Open-Source AI

Anyone can manipulate open-source AI for nefarious and criminal purposes, which poses threats at the highest level. Organizations need new threat models to be ready for bad...

Grow Your Own Cybersecurity Team

The demand for competent and qualified security professionals is higher than ever. In this insightful keynote presentation, you will learn how to tap into your existing IT...

Grow Your Own Cybersecurity Team Presentation

The demand for competent and qualified security professionals is higher than ever. In this insightful keynote presentation, you will learn how to tap into your existing IT...

One-Page Emergency Incident Response Plan

Use this tool to develop an emergency incident response plan on a single page.

Threat Landscape Briefing – September 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us