Start Date
End Date
Location
Category
We read about hacks and breaches almost every day and picture either someone wearing a hoodie or a roomful of organized cybercriminals typing away. We are often left feeling either victimized because we got hacked or relieved that we did not. If we want to protect our data the selection of cyber security solutions is vast. However, the assumptions behind these solutions are often false; yet, they have been tenaciously integrated into marketing campaigns, websites, interviews and product pitches that they have effectively become an agreed upon “truth”. Cybersecurity myths such as “Attackers need to be right just once and the defenders need to be right all the time”, “More security products mean better security”, and “You don’t have to outrun the bear you just have to outrun your friend” or “Sophisticated threat actors use sophisticated tools” can downright compromise your cyber security system.
In this two-part webinar series, in addition to discussing the evolution of networking and security, we will reveal what cybercriminals are thinking, bust some popular cybersecurity myths and discuss how to protect your data using SASE. In Part 1 we will learn to know thy enemy by diving into the basic hacking techniques, the types of current hacking tools used, and the scope of these attacks. Demonstrations will include how threat actors conduct Open Source Intelligence (OSINT), ransomware case studies, defence evasion tactics, and more. We will discuss best practices on how to protect ourselves and our businesses. In Part 2 we will examine several popular cyber security myths by looking at their origins and the evolution to their current forms. We will bust these myths using examples from security incidents and recent security research. More importantly, we will discuss how SASE is different from traditional solutions such as SD-WAN and how it is revolutionizing approaches to edge network security, performance, and compliance.
This free webinar will take place in two parts.
Part 1 – The Hitchhiker’s Guide to the (Hacking) Galaxy
Learn to think like cybercriminals and use SASE to protect your data from them
–> Thur, February 16 @ 10am PST | 1pm EST
In this part 1 of a two-part webinar series, we will discuss the evolution of networking and security, reveal what cybercriminals are thinking, and discuss how to protect your data using SASE. We will dive into the basic hacking techniques, the types of current hacking tools used, and the scope of these attacks. Demonstrations will include how threat actors conduct Open Source Intelligence (OSINT), ransomware case studies, defense evasion tactics, and more. We will discuss best practices on how to protect our data.
Part 2 – Cybersecurity MythBusters and How SASE Can Come to the Rescue
Unbelieve these cybersecurity myths and truly protect your data with SASE
–> Thur, March 2 @ 10am PST | 1pm EST
In this part 2 of a two-part webinar series, we will examine popular cyber security myths and discuss how they compromise network security. We will look at their origins, the evolution to the current forms and bust them using examples from security incidents and recent security research. We will discuss how Secure Access Service Edge (SASE) revolutionizes network security and performance. Key differences between SASE and traditional solutions such as SD-WAN will be discussed, along with SASE capabilities such as FWaaS, CASB, DLP, ZTNA, and SWG.