Upcoming Webinars

10am PT / 1pm ET / 7pm CET

How to Achieve Secure CDLC through Threat Modeling

 The webinar will provide an overview of the Cloud Development Life Cycle (CDLC), and the importance of securing the CDLC as early as the design and planning phases. We will explain the value of threat modeling to create a CDLC diagram, which visualizes the attack surface, identifies security threats and requirements, and provides documentation for security validation. We will also highlight architecture pattern standards, and offer guidance for vulnerability management assessments, plus prioritization of remediation, resolution and mitigation.

Presented by Alex Bauert, Sr. Director, Threat Intelligence, ThreatModeler

Past Webinars

10am PT / 1pm ET / 7pm CET

Introduction to IoT security

This introduction explores some of the factors that make IoT security difficult by comparing IoT security with traditional security techniques for laptops and PCs. It explains some of the new security techniques being worked on in the industry to make IoT solutions more secure and resilient.  


10am PT / 1pm ET / 7pm CET

Securing Your Digital Assets from Cyberattacks Starts with Mapping Them to Your Risk Program

With the recent wave of DNS and domain name hijacking, and the emergency directives from the Department of Homeland Security and other governing authorities, securing your organizations digital assets—domains, DNS and digital certificates— is more important than ever.  Many companies don’t understand the risks associated with these vulnerabilities and don’t know where to start.  CSC Global Product Manager of Security Services, Michelle Rodenheiser, discusses the importance of mapping your digital assets to your risk program.

Michelle Rodenheiser, Product Manager in Security Services, CSC

10am PT / 1pm ET / 7pm CET

Introduction to ransomware

Ransomware has continued to plague organizations over the years and in 2019 we’ve seen a resurgence of this threat. This webinar is intended to give viewers an overview of ransomware, what is it, how does it work, motivations of the actors behind it, recent trends seen, and how you can minimize your risk of becoming a victim.

Jon Clay – Director: Global Threat Communications, Trend Micro

8am PT / 11am ET / 5pm CET

Building Effective Cyber Intelligence Programs

A.J. Nash, the Director of Cyber Intelligence Strategy for Anomali, will be providing a informative presentation on building effective cyber intelligence programs. He will walk through the problems most companies face, some fundamentals of intelligence, the keys aspect to focus on in building and maintaining an effective intelligence program, and samples of how mature intelligence programs are structured and function. Other topic highlights include; vendor and source selection, personnel challenges, budgeting and project planning to improve your intelligence posture. 

A.J. Nash – the Director of Cyber Intelligence Strategy, Anomali

10am PT / 1pm ET / 7pm CET

Building a Modern, Scalable, and Effective Application Security Program

Over the past 20 years there have been a dozen different major theories on how you should implement an application security program. Yet the average number of serious vulnerabilities in web applications today is 28.6, almost exactly what it was in 2003 when the first OWASP Top Ten was released.  Even the risks in the Top Ten itself haven’t changed. With the era of Digital Transformation, Cloud, and DevOps things only look more grim. The answer is a new modern approach to achieving application security that directly measures security outcomes instead of indirect measurements of processes or teams.

Jeff Williams – Co-Founder & Chief Technology Officer, Contrast Security

10am PT / 1pm ET / 7pm CET

Root of Trust and Digital Identity

Every aspect of our lives is being digitized.  Establishing and protecting digital identities is emerging as a central component of security and privacy.  This webinar will show how the “Root of Trust” morphs and manifests in the context of Personal IDs, IoT, Crypto Currency, and Blockchain.  The “Root of Trust” is used in each of the contexts to secure a Digital Identity that is authentic and immutable.

James Livingston - Vice President of Sales and Business Development, WISeKey

7am PT / 10am ET / 4pm CET

Controlling access to your data and services

Unauthorized access to sensitive data can have disastrous impacts. Whether deliberately or by negligence, these exposures continue to happen around the world. Learn the root causes of most data leak incidents and exposures, explore the government initiatives to protect the data in cyberspace, and discover what solutions are available for both individuals and organizations to protect their most important assets.

Matej Zachar – Chief Security Officer, Safetica

8am PT / 11am ET / 5pm CET


Every breach that FireEye responds to has one thing in common – the breached organization had firewalls in place. Modern attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play a very high stakes game of “whack-a-mole,” tracking down and eliminating threats as quickly and efficiently as they can. A network forensics strategy can give security professionals visibility into all an organizations’ network traffic-regardless of where it is coming from - and allow them to quickly find the threats hiding in their network.

  • Understand the benefits of a network forensics strategy
  • Leverage network forensics to improve security and increase traffic visibility
  • Gain insights into how network forensics improves incident response times and reduces risk of loss
  • See how network forensics enables retrospective threat hunting

Bill Cantrell, VP of Network Product Management, FireEye

11am PT/ 2pm ET

Email protection

Email remains the number one tactic for threat actors targeting organizations. Threat actors use email to deliver ransomware, phishing, and business email compromise, among others. In this webinar, learn the latest email trends and attack methods that threat actors are using, who they target within your organization, and their objectives. Finally, learn about the newest technologies used to detect threats, and best practices to reduce your attack surface.

Jon Clay – Director of Global Threat Communications, Trend Micro

4pm (GMT+1)/7am PT

Cyberattacks on Infrastructure

This webinar will share research by ESET, on one of the most dangerous Advanced Persistent Threat (APT) groups active today – TeleBots (aka Sandworm). The attackers have been targeting critical infrastructure over the past several years, most notably during the first ever, malware-enabled electricity blackouts, and the most damaging cyberattack in history by NotPetya. The webinar will also focus on the group’s most recent attacks against energy companies in Europe by the GreyEnergy malware.

Robert Lipovsky – Senior Malware Researcher, ESET

Protecting your hardware

This webinar presents the importance of endpoint security and hardware enforced security solutions that protect, detect, and in case of breach, allow for swift recovery from attacks.

Anais Gurruchaga – Personal Systems Security Lead, HP Inc.
Corbett Hoxland – Security Business Developer, HP Inc.