Views Navigation

Event Views Navigation


Business Email Compromise and Fraud

Cyber attacks are coming fast and furious. Investigate three real-life cases of successful email compromises: self-discovered compromise, blackmail attempt, payment redirection. Gain insight into what defense strategies you can apply to your business.

Cloud Security Best Practices

Youtube Google LLC, D/B/A YouTube. 901 Cherry Ave., San Bruno,

Michael Argast, Co-Founder and CEO of Kobalt Security Inc. joined Optimus Information to discuss common security challenges faced today and what businesses can do to minimize their risks.

Security Questionnaire and Compliance Webinar

If you’re selling to large enterprise, government or other regulated industries, you’ll have come across the dreaded “security questionnaire” or complex security contractual terms. It’s a chasm you need to cross in order to be able to close the deal and take your business to the next level, but for those who aren’t immersed in security, the technical terms can be complex, the costs uncertain and risks high.

Attack and Defense EP2: Protecting the Cloud

Cyber criminals target your cloud environment because that's where you store your most valuable data. In this Attack and Defense episode, we will dive deep into several different real-life cloud infrastructure breach events.

Digital Charter Implementation Act: Canada’s GDPR?

Clients trust you with their personal information. As a result, you need to make sure you are complying with the most updated version of privacy legislation. Bill C-11 is a recently proposed Canadian Federal privacy legislation that you need to be aware of. When the legislation comes to a pass, it can affect your business in various ways. In this webinar, we will discuss the implications of this legislation and the steps you can take to better protect your business and your clients.

How to enable and secure work within your distributed teams

As your business grows, building a great culture, finding flow and ensuring security in your digital environment are becoming more crucial. If you don’t have the right tools and tactics to enable secured and efficient collaboration within your distributed team, your business can run into unnecessary risks.

Addressing challenges in the cloud

Traditional approaches to cloud compliance are not effective anymore. Adopt new cloud security tools, technologies and automations to meet today’s growing security demands.

How to create a cyber resilient business

As a business leader, one of the worst nightmares is becoming a victim of a cyber attack. A cyber attack can erase all the hard work you’ve put into the business throughout the years in a split second.