Online

Accelerate your Compliance Journey – Deep Dive on key Cyber Regulations

2:00pm AEST | 12:00pm SGT Focus on understanding mandatory information security regulations – APRA CPS234 in Australia & MAS Guidelines Singapore In association with METRICSTREAM Simplified Regulatory Compliance, Advanced IT & Cyber Risk Qualification, and AI-Powered Next-Gen Vendor Risk Management Attend this webinar to learn: Understanding of the Australian Prudential Regulatory Authority (APRA) CPS 234, […]

Accelerate your Compliance Journey – Deep Dive on key Cyber Regulations Read More »

Security Sandbox

The security story’s remained the same for some time: prevent, detect, respond. In the inaugural season of Security Sandbox, Relativity’s CSO and CIO, Amanda Fennell, shelves the tedium of convention and explores a new approach. From cooking to cars, she chats with her Calder7 team and other security luminaries—along with a few unusual guests—about using

Security Sandbox Read More »

The Changing Face of Endpoint Security in a 5G World

In today’s ever-changing cybersecurity landscape, firewall performance should be standardized in order to keep real-5G, the fifth generation of mobile networks, is more than just increased speed; it is a leap towards an always connected future, eliminating the need to rely on public or unsecured Wi-Fi networks, but also introducing new security and management challenges. In this on-demand webinar,

The Changing Face of Endpoint Security in a 5G World Read More »

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident

On Friday, July 2, at least eight MSPs were hit with ransomware that infected their infrastructure and many of their customers. The attack exploited some unpatched vulnerabilities in the on-premises Kaseya VSA product, and then leveraged the remote monitoring and management (RMM) solution to help spread the ransomware. The incident allegedly has affected up to 1,500 companies, and

Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident Read More »

Building Smarter College Campuses with Multi-Factor Authentication

Student and faculty information can be accessed from anywhere at any time. With that comes the need to restrict unauthorized access to these applications and data. By adopting multi-factor authentication (MFA), higher education institutions know that their information is always safe and compliant. Join and learn about: Education and cybersecurity MFA in college campuses User

Building Smarter College Campuses with Multi-Factor Authentication Read More »

Top Reasons Why Manufacturing Needs Network Security

Manufacturing is one of the most hacked industries in the world, second only to healthcare. As manufacturers modernize their shop floors and set up sophisticated Operational Technology (OT) networks, they are increasingly falling in the crosshairs of determined cyber criminals. In this webinar, we will explore the unique security challenges of distributed manufacturers, including: IP

Top Reasons Why Manufacturing Needs Network Security Read More »