*Webinar Topics are subject to change and will be confirmed a few days prior to the date.
IM Cyber Security Webinar Descriptions and Recordings
Cyber Resilience - how prepared are you?
With the mounting number of cyber attacks facing organizations everyday, Cyber Security is gradually being recognized as an inherent component to be embedded across people, processes and technologies. There is also a more important concurrence on the need for this embedding to be continuous – i.e. Cyber Security must be considered as an ongoing process and not a state at a given point in time. This thinking has led to the inevitable convergence of Cyber Security and Business Continuity Management, ushering in the era of Cyber Resilience.
Cyber Resilience is the ability of an organization to continue to deliver its stated goals and objectives in a secure manner, even when it is under attack. This webinar how Cyber Resilience can be a key indicator of your organization’s long term productivity and even survival.
Click to View the Recording >>
GDPR must be an integral part of your Governance Risk and Compliance
GDPR Most organizations are aware of the need for a significant improvement in the way they manage their risk, internal audit and compliance functions through better automation of data and information. As illustrated by OCEG survey, 85% of companies interviewed are convineced they would benefit from integrating the use of technology for their Governance Risk and Compliance (GRC) activities. The need for a GRC technological solution is there, but the question remains: which technological tools will be able to provide the appropriate solution?
Quest Platform Management leverage your exisiting Microsoft infrastructure, and automates auditing functions. Watch this video to learn about GRC and how to efficiently manage, mitigate and audit risk and compliance.
Click to View the Recording >>
GDPR is Here - What is Next for META?
Now that GDPR is in effect, how can META organizations prepare themselves for the new compliance regime? In this webinar, Praveen Joseph, CIPP/E, CISSP demystifies GDPR and discusses a practical implementation roadmap for organizations to adopt and implement.
Click to View the Recording >>
Security Standards - How to Maximize your ROI
GDPR promises National economies are heavily reliant on informaiton systems, devices and networks for their sustenance and growth - a trend which is leading to complex connectivity and unamanged data sharing. This has led to an exponential growth of the risk landscape and has heightened the need for stronger data protection systems. Regulatory frameworks for security management are one of the most common methods to achieve this not just for end-users, organizations and industries, but also for nations as a whole.
Some stellar examples include the NESA Informaiton Assurance Standards in the UAE, the SAMA Cyber Security Framework in Saudi Arabia, and on an international level, GDPR.
Click to View the Recording >>
GDPR - Overview and Implementation Roadmap
GDPR promises a major upheaval of the data privacy landscape globally. With major data privacy breaches being reported very regularly, GDPR's timing could not have been more appropriate. Ingram Micro Cyber Security is pleased to present our GDPR webinar. Join us as our GDPR expert, Praveen Joseph, CIPP/E, CISSP gives us as overview of GDPR and walks us through a practical GDPR implementation roadmap.
Click to View the Recording >>
Artificial Intelligence and Cyber Security
Touted as the Fourth Industrial Revolution, Artificial Intelligence is set to transform many aspects of the Digital World. AI has already entered our lives in ways we haven’t realized – from personalized social media news feeds to highly intelligent home automation systems. What are the implications for Cyber Security? Cases are emerging of AI powering cybercrime in certain regions. In response, organizations are already incorporating AI and Machine Learning into their security strategies. How are they doing? How can we be prepared?
Click to View the Recording >>
How to Sell Cyber Security
Effectively addressing Cyber Security requires plannied investment across three large areas, namely people, processes and technology. Many organizations approach Cyber Security with a short sighted strategy that inadequately addresses some of these three vital components. As a spcialist provider of Cyber Security solutions, how equipped are you to correctly position solutions to your end-customers?
Click to View the Recording >>
How to Detect Ransomware using AlienVault USM
Ransomware is a top security concern for organizations today and is the fastest growing security threat, perceived by 80% of Cyber Security professionals in a recent survey conducted by the Information Security Community on LinkedIn. Malicious actors continue to develop new techniques and strategies to trick victims into downloading and installing the ransomware on their systems, and many IT teams are ill-equipped to respond.
AlienVault USM Anywhere uses several built-in security controls working in unison to detect ransomware and automate actions to mitigate the threat. Join us for a live webcast to learn about ransomware and how to detect these threats quickly, saving you valuable clean up time and limiting potential damage from the attack.
Click to View the Recording >>
Blockchain and Cryptocurrencies - Unraveling Their Role in Cybercrime
Blockchain is poised to transform a plethora of industries, ranging from banking and insurance to healthcare and IT. The cybercrime industry is no exception, and has been one of the early adopters of this technology. Cryptocurrencies, one of the most popular by-products of Bloackchain, are a favourite platform of cybercriminals for receiving payments. Primarily owing to the excellent anonymity factors that they afford, cryptocurrencies power a huge number of illicit transactions on the dark web. For example, the famous WannaCry ransomeware attack solicited payments in Bitcoins.
What does this all mean to Cyber Security specialists? How will Blockchain transform the Cyber Security industry? Watch the webinar again using the below link.
Click to View the Recording >>
Combat DDoS Attacks and Uncover Encrypted Attacks with A10 Solutions
In this webinar, Ingram Micro's senior Cyber Security consultant, accompanied by experts from A10 Network discuss how A10 Thunder TPS and Thunder SSLI can help organizations to fight DDoS attacks effectively. The webinar also discusses how A10 solutions provide visibility to your current security devices and help fight encryption-oriented attacks.
Click to View the Recording >>
IM Cyber Security Services and Trainings:
Stay up to date with the activities of the Ingram Micro by understanding the various Assessment Services, Consultancy Services and Cyber Security Trainings we have on offer.
Click to View the Recording >>
Future Cyber Security Challenges (GDPR, IOT and Wearables):
The future looks exciting in the world of Cyber Security. New trends in technology bring tremendous opportunities in Cyber Security, and with them, a fair share of challenges. How prepared are we for the future? Watch this recording, as we find out:
Session 1: GDPR Compliance Simplified
The new European Union's General Data Protection Regulation (GDPR) is a game-changer for compliance and protection of personal data. EU GDPR is already in effect and will be enforced by May 25, 2018. If you are doing business with Europe and handle data belonging to an EU resident, EU GDPR applies to you. Join us as we explore how GDPR may impact your business and how you can implement timely and efficient compliance.
Session 2: Security Challenges in Emerging Technologies
The explosion of technology revolutions in recent times has presented a plethora of challenges to Cyber Security professionals. Security by design, rather than security as an after-thought is emphasized now more than ever before. This session will explore look the Cyber Security challenges and opportunities in two emergent technologies – the Internet of Things, and Wearable Devices.
Click to View the Recording >>
Multi-Vendor Architecture and Vendor Trainings
Watch our Senior Consultants talk about the advantages and uses of Multi-Vendor Architecture with the help of a real example using the solutions of multiple vendors. We also talk about the various trainings that IM Cyber Security Vendors have on offer.
Click to View the Recording >>
Top Success Metrics of Cyber Security Incident Response
As more and more organizations come to terms with the reality of cyber security attacks investments are being made towards bolstering their incident response capability. However, several challenges continue to hinder organizations’ ability to respond efficiently to incidents. This greatly aggravates the impact of a breach.
What does it take to build a successful Cyber Security Incident Response Capability? Watch our webinar to learn about the top success metrics of cyber security incident response.
Click to View the Recording >>