Meeting Compliance Goals and Beyond: Virus Protection on IBM Systems
Thursday, October 22 | 10:00 a.m. CT
When it comes to cybersecurity, the old proverb “what you don’t know can’t hurt you” could not be further from the truth. Unfortunately, despite hosting mission-critical applications and data, IBM Systems like IBM i, AIX, LinuxPPC, and Linux on Z are often neglected and left unprotected. While these systems are beloved for their performance and reliability, none of them are immune to malware.
As the number of compliance mandates have continued to grow, there is more awareness about the need to properly secure every endpoint—so why are so many organizations still getting breached? In this live webinar, cybersecurity expert Bob Erdman will discuss the impact viruses, ransomware, and other attacks can have on IBM systems, the importance of native protection, and how to overcome obstacles impeding progress to meeting compliance responsibilities.
3 Fundamental Pen Tests Every Organization Should Run
A penetration test is often referred to broadly as an evaluation of an organization’s cybersecurity through the uncovering and exploitation of security weaknesses. However, this doesn’t mean there is only one way to pen test. Since vulnerabilities can exist anywhere—operating systems, services and application flaws, improper configurations, or even risky end-user behavior—multiple types of pen tests have been developed to ensure every aspect of the IT infrastructure is secure. Since many organizations may not have enough time, budget, or expertise to run every type of pen test, how do you know which ones to choose?
In this live webinar, cybersecurity expert James Adams will discuss the three pen tests that should be at the top of your list:
- Vulnerability scan validations
- Web application tests using SQL injection and OS command injection
- Phishing campaign simulations
Learn why these tests should be prioritized, the most efficient way to run them, and what steps should be taken after they’ve been completed to ensure you can intelligently manage vulnerabilities and strengthen your security.
Closing the Gap on Access Risks
Access-related risks represent one of the biggest obstacles organizations must address in a complex threat landscape—and they are lurking everywhere. Whether from changes in the business, like hiring, promotions, or transfers, from business growth and transformation, including M&A activity, corporate reorganizations, or new product introductions, from infrastructure changes, like new platforms, applications, and systems, or from insider threats, which can arise intentionally or unintentionally, access risks present a constant threat to the business.
Join this webinar to learn how your organization can leverage identity governance and administration (IGA) to mitigate identity-related access risks within your business. Take a deep dive into recent research findings to discover:
- How identity governance and administration enables organizations to close the gap on access-related risks
- How unauthorized access incidents are reduced in organizations that leverage strategic IGA programs and solutions
- The latest trends, challenges, gaps, and solution preferences for IGA
- How protecting privileged accounts is essential in reducing access risks
- How the right IGA framework can bolster risk management and enhance your overall security posture