Regardless of your model, most approaches start with a strong and well-managed perimeter ensuring as far as possible that nothing makes it into the core that should be there. From people to malicious code, the earlier you can prevent it the better. Here are Five of our most recent webinars to help you consider and reassess your security technologies, policies and processes.

Securing the Edge: Using SSE to Empower Zero Trust Access

In this webinar, you will take a deep dive into applying an integrated approach to network security and efficiency. John Spiegel, Director of Strategy at HPE unravels the synergy between Security Service Edge (SSE), Software-Defined Wide Area Network (SD-WAN), and Secure Access Service Edge (SASE). Spiegel explains how the convergence of these technologies can create a robust, scalable, and agile framework for businesses navigating the complexities of digital transformation.

Exploring Five Emerging Cybersecurity Defenses

In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. In this webinar, Steve Piper, CISSP – Founder & CEO of CyberEdge, reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM), Cloud-native application protection platform (CNAPP), Cloud infrastructure entitlement management (CIEM), Identity threat detection and response (ITDR) and passwordless authentication.

Your Digital Identity: How Cybercriminals Can Get Around Authentication Methods

Inadequate authentication measures not only leave network, application and data access vulnerable, it can leave your digital identity vulnerable to cybercriminals. Tools like multi-factor authentication, biometrics, passwords, PINs, and tokens – all common methods used to improve access as well as identity protection – are all more vulnerable to attacks and social engineering than you realize. Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 takes a deep dive into the authentication process and explains why strong authentication is vital to your organization’s security. Grimes also uses real-world examples to highlight the authentication vulnerabilities for biometrics, MFA, passwords, and more.

How to Augment Your Microsoft 365 Security

Microsoft 365 is a mission critical tool for organizations of all sizes, enabling global collaboration, remote work, as well as cloud computing and data storage. While Microsoft provides native email security capabilities via Exchange Online Protection (EOP) and through additional security tools like Microsoft Defender for Office 365, organizations need to augment these defenses to protect against modern sophisticated email threats such as business email compromise (BEC), advanced phishing, and account takeover. Proofpoint’s Mark Harris, Cybersecurity Advisor and Tim Bedard, Director of Product Marketing look in detail at how to break the attack chain and stop advanced email threats, along with examining what key security areas you need to augment in your Microsoft 365 platform.

Policy-Based Access Control: What It Is & Why You Can’t Modernize Without It

Ever wonder what Policy-Based Access Control (PBAC) is? Why is PBAC Crucial to a modern business and how does it overcome the management and scalability challenges of RBAC and ABAC?

In this webinar, Mickey Martin, Director of Product Outreach and Lani Leuthvilay, Head of Product Marketing at PlainID explain how PBAC differs from traditional access control models, sharing insights into how to use effective policies to protect sensitive data and ensure regulatory compliance.

You can find even more existing and upcoming webinars in our webinar archive. Viewing ISC2 webinars also entitles members to CPE credits.