G2M Research Multi-Vendor Webinar Series

Our Cybersecurity webinar schedule is below. Registration links will be available soon, and you can always contact us directly with questions. 

Interested in Sponsoring a webinar? Contact G2M for a prospectus.

Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.

Last month Joe Sullivan, the former CISO of Uber, was found guilty of not disclosing to government regulators a 2016 breach of customer and driver data. Uber concealed the breach by paying the hackers using bug bounty funds. Bug bounty programs provide a way of paying “white hat” researchers to report security vulnerabilities. But some companies use bounty programs to conceal problems that should have been disclosed under state or federal rules. Bug bounties usually require nondisclosure deals, some of which last forever.  This webinar looks at the pressures companies are to keep their business operating with ransomware hacks a prevalent factor impacting them.

2022 saw a fundamental shift and escalation in the cybersecurity landscape. The invasion of the Ukraine, the threats to Taiwan, and the escalation from threat actors has put everyone, no matter how large or small your business, on the front lines. Join leading vendors in the cybersecurity space for a discussion about what new threats are likely to occur in 2023, and new tools that will provide an opportunity to improve your organization’s cybersecurity posture.

The rebound from COVID has produced a workforce where remote workers are becoming the norm rather than the exception in the vast number of white-collar industries. With the trend to remote work and the “always-on” workforce comes a proliferation of mobile devices as endpoints in corporate networks. The result is a cybersecurity attack surface that has expanded beyond the typical physical boundaries that kept organizations secure. Our panel of experts on endpoint security and attack surface management will explore best practices on how to secure the remote “always-on” workforce from cybersecurity threats.

Willie Sutton was once attributed (incorrectly) to have said that “people rob banks because that is where the money is”. The same is true of cybercriminals, which is why regulatory agencies continue to ratchet up the requirements for resilience in the face of cyber threats. The combination of regulatory frameworks and data protection schemes such as the CBEST, PCI DSS, EU-GDPR and UK-GDPR, NIST 800-53, and others means that the cybersecurity regulatory and compliance workload has increased for most businesses in the financial services (FS) sector. Join our panel of experts as they discuss how to streamline the ever-increasing cybersecurity regulatory and compliance workloads that organizations in the FS sector are facing.

Cybersecurity is no longer just the domain of engineers in the Security Operations Center (SOC) and their bosses in the CISO and CIO shops. Boards of Directors, CEOs, and CFOs all now worry about cybersecurity – from the threat of breaches and data exfiltration to regulatory concerns to the ever-increasing cybersecurity budgets, it is a subject that they are both responsible for and (often) not experts in dealing with. Understanding what insights these executives need to perform their duties and obligations is becoming more critical. Join us for a roundtable discussion on how to best provide the needed cybersecurity data to the C-Suite and Boardroom.

By all accounts, the technology world is woefully short of cybersecurity professionals. According to estimates by ISC2, there is a shortage of 2.72 million cybersecurity professionals worldwide. This shortage is expected to get worse over time, and budgets alone cannot solve it. This is why most IT and CISO organizations are prioritizing training and retention of cybersecurity professional, often even above spending on the cybersecurity stack. Join our panel of experts as they discuss how to best find, train, and retain cybersecurity talent.

Extended Detection and Response (xDR) is one of the newest trends in cybersecurity that promises to provide a holistic approach to cybersecurity. Nearly every major cybersecurity vendor has or is promising xDR capabilities in their latest tool suites. As with most new trends, the actual value delivered is often a function of how the tool is utilized in conjunction with other tools and practices in the Security Operations Center (SOC). Join our panel of leading experts on xDR to explore the capabilities of these tools as a part of the larger cybersecurity technology stack.

While data privacy (in all of its different flavors) and cybersecurity best practices are complementary to each other, they are clearly not the same. Each of these areas has distinct goals, frameworks, and practices which do not necessarily overlap; for instance, your organization could be completely impregnable to data breaches and be non-compliant with data privacy regulations (or vice-versa). Explore the important differences between these two disciplines, and the keys to making it all work together in this webinar.

Security ratings are measurements of an organization’s security posture and highlight vulnerabilities that put the organization at risk of breach. Once a company has its score, for better or worse, what next? How reliable is the information? Can my score impact my insurance premium and/or ability to get insurance? What measures can I take to reduce my risk in the most cost-efficient way possible? What is the value in having a third-party risk management program? Join industry experts to look at security ratings and TPRM programs to learn how companies can leverage them for the greatest ROI.

Attack surface management (ASM) is a relatively new concept for the continuous discovery, monitoring, and remediation of an organization’s cybersecurity vulnerabilities to external threats. Yet while the majority of vendors agree on the concept of ASM, the implementations of ASM differ widely from one company to another. Join our experts as they discuss what features are necessary to have an effective ASM product, and why they are important.

The cloud literally opens up a number of opportunities for companies to rapidly scale up and scale down compute resources, network bandwidth, and storage capacity. However, securing the cloud is a very different matter than securing on-premises datacenters, and the fact that Amazon, Microsoft, or Google are running the virtual datacenter is not in itself a guarantee of security. Join our panel of cloud cybersecurity experts in exploring the emerging trends in securing cloud resource and workloads as we discuss best practices for resilient cloud cybersecurity architectures.

Security Information and Event Management (SIEM) platforms are certainly not for everyone. In most cases, SIEMs tend to be utilized by large companies that can support A SIEM’s need for data, the staff expertise required, and the complexity of setting it up and operating it. However, for organizations with the right use case(s) and the abilities to support them, SIEMs can provide critical strategic value. Join some of the leading experts in the industry as they discuss situations where a SIEM can provide great value to an organization.

As with anything in cybersecurity, what today’s threats and trends are today is not necessarily predictive of what they will be tomorrow. Join our panel of leading cybersecurity vendors as they discuss what they see coming to the forefront in cybersecurity threats, trends, and innovative products for 2024, and their impacts on managing your organization’s cybersecurity posture and resilience.

Interested in attending our webinars? Register by clicking on the dates of interest. Interested in Sponsoring a webinar? Contact G2M for a prospectus.

Information about prior webinars, including video and a PDF of the webinar slides is available under the Archived Webinars tab.