Research into how well large companies manage risk from subsidiaries, what difficulties they encounter, and the ramifications of these. Sponsored by CyCognito.
Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Sponsored by PerimeterX.
Research on the challenge of sensitive data discovery and how organizations are prioritizing and assigning responsibility for it. Sponsored by ActiveNav.
Explores the current state of cybersecurity threats, preparedness, and response capability in the government sector. It offers direction to decision-makers and influencers working in the government sector on increasing the maturity and effectiveness of cybersecurity protections in government. Sponsored by Anomali, BIO-key International, KnowBe4, Mimecast, Progress MOVEit, and Virsec.
Presenting the findings of our recent report on security blind spots in the software supply chain. Webinar hosted by GrammaTech.
Discussing the findings on vulnerable open-source components in commercial off-the-shelf software. A conversation between Deb Radcliff for GrammaTech’s Shift Left Academy and Michael Sampson from Osterman Research.
The findings of an investigation into the use of open-source components in commercial off-the-shelf software—many of which have a list of known vulnerabilities—across five common software categories. Sponsored by GrammaTech.
A guide for MSPs, security VARs, and cloud distributors for understanding the current cyberthreat landscape and the opportunity for advanced email security solutions that safeguard their customers while offering an additional stream of recurring revenue. Sponsored by Acronis.
Webinar on reducing the risk of phishing and ransomware, hosted by Avanan.
Discussion on the efficacy of native archiving and data protection capabilities in Microsoft Teams, and where third-party solutions offer better value. Presented in conjunction with IPRO.