top of page
AdobeStock_334107029.jpeg

Webinars

G2M Research Multi-Vendor Webinar Series

Our Cybersecurity webinar schedule is below. Registration links will be available soon, and you can always contact us directly with questions. 

Interested in Sponsoring a webinar? Contact G2M for a prospectus.

Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.

Willie Sutton was once attributed (incorrectly) to have said that “people rob banks because that is where the money is”. The same is true of cybercriminals, which is why regulatory agencies continue to ratchet up the requirements for resilience in the face of cyber threats. The combination of regulatory frameworks and data protection schemes such as the CBEST, PCI DSS, EU-GDPR and UK-GDPR, NIST 800-53, and others means that the cybersecurity regulatory and compliance workload has increased for most businesses in the financial services (FS) sector. Join our panel of experts as they discuss how to streamline the ever-increasing cybersecurity regulatory and compliance workloads that organizations in the FS sector are facing.

Extended Detection and Response (xDR) is one of the newest trends in cybersecurity that promises to provide a holistic approach to cybersecurity. Nearly every major cybersecurity vendor has or is promising xDR capabilities in their latest tool suites. As with most new trends, the actual value delivered is often a function of how the tool is utilized in conjunction with other tools and practices in the Security Operations Center (SOC). Join our panel of leading experts on xDR to explore the capabilities of these tools as a part of the larger cybersecurity technology stack.

Attack surface management (ASM) is a relatively new concept for the continuous discovery, monitoring, and remediation of an organization’s cybersecurity vulnerabilities to external threats. Yet while the majority of vendors agree on the concept of ASM, the implementations of ASM differ widely from one company to another. Join our experts as they discuss what features are necessary to have an effective ASM product, and why they are important.

The cloud literally opens up a number of opportunities for companies to rapidly scale up and scale down compute resources, network bandwidth, and storage capacity. However, securing the cloud is a very different matter than securing on-premises datacenters, and the fact that Amazon, Microsoft, or Google are running the virtual datacenter is not in itself a guarantee of security. Join our panel of cloud cybersecurity experts in exploring the emerging trends in securing cloud resource and workloads as we discuss best practices for resilient cloud cybersecurity architectures.

Security Information and Event Management (SIEM) platforms are certainly not for everyone. In most cases, SIEMs tend to be utilized by large companies that can support A SIEM’s need for data, the staff expertise required, and the complexity of setting it up and operating it. However, for organizations with the right use case(s) and the abilities to support them, SIEMs can provide critical strategic value. Join some of the leading experts in the industry as they discuss situations where a SIEM can provide great value to an organization.

Interested in attending our webinars? Register by clicking on the dates of interest. Interested in Sponsoring a webinar? Contact G2M for a prospectus.

Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.

bottom of page