Core Security Webcasts

Upcoming Events

Past Events

Titlesort ascending Description Type Date
Where are you on the Threat & Vulnerability Management Maturity Model?

Join us for a live webcast hosted by BrightTALK. 

Date: Friday, December 19, 2014
Time: 1pm ET, 10am...

CORE Insight Enterprise 12.19.2014
What's New in Core Insight 4.0 and Core Impact 2014 R2

The release of Core Insight 4.0 and Core Impact 2014 R2 provide a better way to prioritize and validate threats to...

CORE Solutions 09.11.2014
Web Application Pen Testing: Can Someone "Steal a Million" From You? Webcast

It’s no secret that web application weaknesses such as SQL injection and cross-site scripting represent a thorn in...

CORE Impact Pro 12.07.2012
The Numbers Game: Tracking Information Security Metrics That Matter Webcast

As a security executive, you’re tasked to continually manage performance and get the most out of your technical,...

CORE Insight Enterprise 12.07.2012
The Human Operating System: Keeping It Secure Webcast

Many organizations invest tremendous amounts of time and energy into the security of their computers – but what...

CORE Impact Pro 12.07.2012
The HB Gary Breach and Social Engineering - Lessons Learned? Webcast

Despite highly publicized breaches such as HB Gary Federal, regimented internal warnings from corporate IT, and even...

CORE Impact Pro 12.07.2012
Seeing Red: Why You Shouldn't Ignore Medium-Level Vulnerabilities Webcast

All too often, pen testers and security consultants ignore yellow findings from vulnerability scans. Red (or “...

CORE Impact Pro 12.07.2012
Security Testing for PCI DSS Compliance featuring Forrester Analyst John Kindervag

The Payment Card Industry Data Security Standard (PCI DSS) mandates security practices covering cardholder data that...

CORE Insight Enterprise 09.25.2013
Protecting Your Organization from Phishing Threats

There are certain security measures all organizations can take to protect themselves from attacks, but phishing...

CORE Insight Enterprise 08.27.2013
Optimizing Vulnerability Management with Forrester Analyst Chenxi Wang Webcast

The new and evolving threat landscape requires that IT security remains constantly vigilant. Keeping on top of the...

CORE Impact Pro 12.07.2012
Human Hacking Exposed - Part 1 Webcast

Many organizations invest tremendous amounts of time and energy into the security of their computers - but what...

CORE Impact Pro 12.07.2012
How eBay Mitigates Risk with Core Security and QualysGuard

In November of 2011, eBay Global Information Security (GIS) began the implementation of Core Insight. One of the key...

CORE Insight Enterprise 11.05.2013
Forrester and Core: Security Intelligence Meets Vulnerability Management

Learn from speaker John Kindervag, Principal Analyst, with Forrester Research and CORE Security on the topic of “...

CORE Insight Enterprise 04.10.2013
Effective Client-Side Testing: No Exploit? No Problem Webcast

If an attacker is going to get in, they are going to get in by attacking a user. Sure, 0-days are neat, but most of...

CORE Impact Pro 12.07.2012
Diary of a Healthcare Chief Information Security Officer

In this webcast, Martin Fisher, CISO at Northside Heath Systems, talks about some of the most pressing challenges...

CORE Insight Enterprise 05.19.2014
Critical Steps for Organizational Security Intelligence - Why You Need an Internal Pen Testing Team

More than ever, organizations are facing advanced adversaries and dealing with rapidly changing technology that may...

CORE Solutions 05.01.2013
Critical Steps for Organizational Security Intelligence - The Importance of Emulating Real-World Threats

For all the talk of real-world compromise scenarios and breaches, very few pen testers actually emulate real-world...

CORE Solutions 06.12.2013
Core Impact Pro v12.5 New Features Webcast

This webcast will highlight the new features within CORE Impact version 12.5.

CORE Impact Pro 12.07.2012
Core Impact Pro v12 New Features Webcast

Please join Core Security for an in-depth webcast introduction to mobile device penetration testing and other new...

CORE Impact Pro 12.07.2012
Beyond Vulnerability Data

Traditional vulnerability management has trained information security professionals to believe that basic...

CORE Solutions 08.27.2014

Pages

 

  • Request Info

BrightTalk Channel

View Core Security webinars on our BrightTALK channel.