Register ahead of time for each month's Cybersecurity Webinar, presented live by subject matter experts, or check out archived webinars, both accessible to you free of charge.


Bulletproof Proxies—How Large-Scale Attacks Hide in Plain Sight

1H |  by Will Glazier |  11:00 AM (CDT) / 16:00 (UTC)

Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the automated bot attack delivery infrastructure by using large networks of Residential Proxies that mask identity and location. Bulletproof Proxies allow bad actors to...


How to Manage Third-Party Risk for Better Enterprise Risk Management

1H |  by Kelsey Naschek, CIPP/E, CIPM |  11:00 AM (CDT) / 16:00 (UTC)

Many enterprises rely on third-party vendors to help facilitate the delivery of products and services to their customers. However, these relationships do not come without risk. Ultimately, the enterprise is accountable for the protection of its data; therefore, enterprise vendor risk management...


Getting Back to Basics—The Fundamentals of Cyber Hygiene

1H |  by Miguel Sian |  11:00 AM (CDT) / 16:00 (UTC)

New innovations with cloud and IoT are changing the ways we use technology and how we secure it. No matter how technology changes there are still the basic things you need to be doing in order to lower your threat risk and maintain the security of your systems and infrastructure. In this webinar...


Winter is HERE! Cybersecurity Lessons from GoT

1H |  by Pam Nigro, CRMA, CISA, CGEIT, CRISC |  11:00 AM (CDT) / 16:00 (UTC)

Security doesn’t stop with building “walls.” Security professionals can become obsessed with adding new, bigger layers of defense. It's rather like how medieval architects enhanced the security of their castles by building additional rings of walls and towers, or as in GoT ‘The Wall’ was built to...