Filter By Topic
ASSET INVENTORY: HOW SECURITY TEAMS GET A COMPREHENSIVE VIEW OF IT, IoT, OT AND MORE
Hosted by Cybersecurity Insiders: All great security programs and compliance frameworks start with comprehensive and accurate asset inventory. And in a world of exploding devices, you need a full accounting of all your devices whether they be IT, IoT, OT, or even medical devices. Join us to explore the challenges that security teams face when building a comprehensive and accurate view of all the assets in their environment.
CDPWN: 5 VULNERABILITIES IN CISCO DEVICE PROTOCOL
Armis discovered five critical vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over corporate and network devices without any user interaction. Watch this live webinar to learn how an attacker would use CDPwn to exploit these vulnerabilities against your switches, routers, IP phones and cameras.
ZERO TRUST SECURITY FOR UNMANAGED AND IOT DEVICES
Zero Trust has exploded in recent years, but almost all of the focus has been on applying Zero Trust principles to users and managed computers. Unmanaged and IoT devices have been left out. Watch this live webinar to learn how Armis fills the gap and lets you apply Zero Trust security principles to unmanaged and IoT devices.
TAMING THE UNMANAGED AND IOT DEVICE TSUNAMI
Hosted by ThreatPost: Join cybersecurity expert Bruce Schneier, Armis CISO Curtis Simpson, and Threatpost Editor-in-Chief Tom Spring as they discuss the proliferation of unmanaged and IoT devices, how attacks against these devices are growing, and how businesses can protect themselves against the risks associated with unmanaged and IoT devices.
5 CRITICAL ITEMS TO CONSIDER WHEN SECURING MEDICAL DEVICES
Hosted by ISMG: Join Abhishek Agarwal, the CISO from Fresenius Medical Care, the world’s leading provider of dialysis products and services, and Curtis Simpson, CISO from Armis, the agentless device security company, as they discuss the explosion of connected medical devices, why traditional security approaches don’t work, and the new playbook needed to manage risk and maintain patient safety.
SECURING CONNECTED MEDICAL DEVICES: THE NEW HIPPOCRATIC OATH
Hosted by Technation: When it comes to medical devices, poor cybersecurity poses risks to patient safety and puts millions at risk. This is an even more pressing challenge for healthcare security professionals especially as cyberattacks continue to mount during the COVID-19 pandemic. Do you know what vulnerabilities may be lurking in your network? In your medical devices? How do you ensure that your environment is safe? Join us to learn how Armis finds these vulnerabilities affecting billions of devices across the globe, and how we safely communicate them to manufacturers, governmental institutions, and the public at large.
CAN YOU SEE EVERYTHING? SECURITY IN AN IOT WORLD
Hosted by Security Week: There’s a virtual tidal wave of smart, connected devices sweeping across businesses in every industry. Can you see them? Can you protect them? Do you know how they are behaving? And most importantly, how do you stop bad things from happening? Join us to learn how to fill the gaps left by traditional security architectures.