Views Navigation

Event Views Navigation

Today

Attack and Defense EP2: Protecting the Cloud

Cyber criminals target your cloud environment because that's where you store your most valuable data. In this Attack and Defense episode, we will dive deep into several different real-life cloud infrastructure breach events.

Digital Charter Implementation Act: Canada’s GDPR?

Clients trust you with their personal information. As a result, you need to make sure you are complying with the most updated version of privacy legislation. Bill C-11 is a recently proposed Canadian Federal privacy legislation that you need to be aware of. When the legislation comes to a pass, it can affect your business in various ways. In this webinar, we will discuss the implications of this legislation and the steps you can take to better protect your business and your clients.

Are you prepared for a breach? A virtual tabletop webinar

A virtual tabletop webinar Do you know how your team would react to a data breach? Set clear expectations, responsibilities and establish procedures to guide your team through the process. With clear directions, your team can effectively minimize loss from incidents. In this webinar, Tyler Hatch, Founder of DFI Forensics and Michael Argast, Founder of...

How to enable and secure work within your distributed teams

As your business grows, building a great culture, finding flow and ensuring security in your digital environment are becoming more crucial. If you don’t have the right tools and tactics to enable secured and efficient collaboration within your distributed team, your business can run into unnecessary risks.

How to create a cyber resilient business

As a business leader, one of the worst nightmares is becoming a victim of a cyber attack. A cyber attack can erase all the hard work you’ve put into the business throughout the years in a split second.

Addressing challenges in the cloud

Traditional approaches to cloud compliance are not effective anymore. Adopt new cloud security tools, technologies and automations to meet today’s growing security demands.