SurfWatch
Webinars
Hear Cybersecurity Experts Share Best Practices
Cyber threats ahead

HOW TO REDUCE AVENUES OF ATTACK: USING INTEL TO PLAN FOR CYBER THREATS IN 2017

On-Demand – Watch Now

Learn about the interconnected nature of cybercrime, and how it tied into the top threat trends from the past year, including: botnet-powered IoT devices causing major outages, the increase of threats targeting supply chains, and breached credentials being used in additional attacks.

Watch Now

Clipboard charting

Understanding Cybersecurity Awareness for Insurance Companies

On-Demand – Watch Now

Get the latest information on cyber threat trends facing the insurance industry, learn about the NAIC Bill of Rights for Insured Consumer Cybersecurity Protection, and understand how threat intelligence can help mitigate risk.

Watch Now

Server to boardroom

How To Connect The Dots Between Your Threat Intelligence Tradecraft And Your Business Operations

On-Demand – Watch Now

Learn how to use strategic and operational threat intelligence so you can better understand your cyber weaknesses and strengths, focus on the key risk areas for your business, and know the most optimal solutions based on your limited resources.

Watch Now

Healthcare webinar

Managing Cybersecurity in the Health Care Industry: What You Need To Know

On-Demand – Watch Now

Cybercriminals are targeting medical records, which contain sensitive and valuable information that may be used for identity theft and fraud. Learn how an intelligence-driven cybersecurity approach can help you minimize cyber risk and avoid future threats.

Watch Now

Ffiec 442w

FFIEC Cybersecurity Assessment Tool: What Your Firm Needs to Know

On-Demand – Watch Now

Watch this webinar where a panel of experts explain what you need to know regarding the FFIEC Cybersecurity Assessment Tool and what it means for your institution.

Watch Now

Intelligence 442w

Cyber Threat Intelligence: Knowing What Specific Risks Your Business Should Address

On-Demand – Watch Now

Hear from an expert panel about the importance of threat intelligence, how to tie cyber to business risk, FTC cybersecurity guidelines and enforcement, and how one organization is using threat intelligence to improve their resiliency.

Watch Now

Gathering intel from the dark web 230

Gathering Intel From the Dark Web to Identify and Prioritize Critical Risks

On-Demand – Watch Now

Watch this webinar to learn how you can leverage Dark Web intelligence to mitigate your risk, including specific Dark Web strategies for CISOs.

Watch Now

Hackers 442w

How and Why Hackers Target Your Business

On-Demand – Watch Now

This webinar examines how attackers get access to high value data, who the principal adversaries are, and offers an inside look at what the FBI and other law enforcement agencies are doing to make cyber threats a major priority in their operations.

Watch Now

Gavel 442w

The Legal Reality of a Cyber Security Breach

On-Demand – Watch Now

In this webinar, security and legal experts discuss the potential liability of breached companies, who's accountable, what is needed to show cyber security due diligence and how threat intelligence can help.

Watch Now

Threat intelligence for mssps 442w

How to Grow Your Managed Security Services Practice with Strategic Cyber Threat Intelligence

On-Demand – Watch Now

In this webcast, industry experts examine how strategic cyber threat intelligence can help you provide your customers with a more proactive approach to cybersecurity that can significantly minimize the fraud, liability, brand damage and overall expense of being breached.

Watch Now

Reisac dark web intelligence 442w

Shining A Light On Cyber Threats From The Dark Web

On-Demand – Watch Now

Stolen intellectual property, financial information, PII and more - it's all for sale on the Dark Web. Keeping the blinders on to your organization's Dark Web threats is a bet you don't want to make. Learn about the Dark Web and how to use Dark Web intelligence to minimize the impact of threats on your business.

Watch Now

Webinar credit unions cross hairs 442w

Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the Curve

On-Demand – Watch Now

Credit unions manage sensitive information, like big banks, but have less staff and resources to deal with traditional and Dark Web cyber threats. are a soft target for cybercriminals. Learn how to gain situational awareness of your cyber threats and practical steps you can take to reduce your most critical risks.

Watch Now

Webinar cyberthreat like disease 442w

How to Treat Cyber Like a Disease - Through Familiar Data Collection and Analysis Approaches

On-Demand – Watch Now

The healthcare industry is used to data-heavy analysis to find resilient solutions and to reduce risk. However, when it comes to cybersecurity, this commitment to data collection and analysis is almost non-existent. Find out why this is the current state and how to improve your security strategy.

Watch Now

Examining dark web trade 442w

Examining Dark Web Trade - Your Cybersecurity Blindspot

On-Demand – Watch Now

Dark Web threats reflect a greater risk level to your organization and often exploit a blind spot in traditional cybersecurity approaches. Learn about the benefits of incorporating Dark Web Intelligence into your cybersecurity program.

Watch Now

Sans state of security webcast 442w

The State of Security in Control Systems Today

On-Demand – Watch Now

SANS conducted a survey of more than 300 ICS professionals and this webcast shares key highlights from the findings to give you insights on the cybersecurity challenges facing your peers and the approaches used to reduce cyber risks.

Watch Now

Point of sale webinar

Point-of-Sale is Point-of-(In)Security: The Threat to Your Business is Bigger Than You Imagine

On-Demand – Watch Now

PoS systems continue to be targeted by cybercriminals for card payment information as well as personally identifiable information. This webcast examines PoS cyber risk trends and impacts, and explains how to gain visibility of your risk from all angles as well as the fundamental security steps to take.

Watch Now

Webinars platfora trapped 442w

How to Access and Make Use of "Trapped" Cyber Data to Reduce Your Risk

On-Demand – Watch Now

Although there are hundreds of security solutions, products and consultants that claim to solve and address data breaches, the traditional, tactical approach to security is not working. Evaluated cyber intelligence is trapped in your systems, applications and employees. This webcast examines the ways to make cyber intelligence easily available and quickly understood so your organization can significantly reduce the cyber risks it faces and improve its business resilience.

Watch Now

Connect boardroom webinar 442w

How to Connect Your Server Room and Board Room - Before a Data Breach Occurs

On-Demand – Watch Now

A data breach can result in loss of jobs and customers, reduced brand reputation, stock price drops and more - with the average cost now reported at $2.7 million. Yet too many organizations continue to drown in low-level threat data and one-off response tactics. Register for this webcast to learn how you can take advantage of evaluated cyber intelligence, measure security through KPI's and facilitate collaboration across your security, IT and business functions to improve your strategic risk management and overall business resilience.

Watch Now

Sans cti webcast 442w

Who's Using Cyberthreat Intelligence and How?

On-Demand – Watch Now

When it comes to the use of cyberthreat intelligence, organizations are scrambling to deploy and use these capabilities, even though they don't even vaguely understand what cyberthreat intelligence is or how it ties in with their defensive and response systems. Watch this two-part webcast to explore cyberthreat intelligence tools and standards and to learn best practices for using intelligence for prevention, detection, and response.

Watch Now

Cyber risk awareness and csuite 442w

How to Raise Cyber Risk Awareness and Management to the C-Suite

On-Demand – Watch Now

Traditionally, cybersecurity responsibility has rested solely with security professionals armed with a variety of low-level network and endpoint protection tools. But as numerous recent breaches have proven, cybersecurity is not simply a technical problem, but a business problem. In this webcast, SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick discuss the shift of cybersecurity responsibility from the Server Room to the Board Room.

Watch Now

Linking enterprise and small business security 442w

Linking Enterprise and Small Business Security to Shore up Cyber Risks in the Supply Chain

On-Demand – Watch Now

In this webinar, SurfWatch Labs Chief Architect and former US Government Intelligence Analyst Jason Polancich, and Carrie Kerskie, a data privacy investigator and expert, examine the insecurity of small businesses in the supply chain and provide practical tips to close backdoors into the enterprise.

Watch Now