Compliance is Never Enough: Encryption & Key Management

by Sarah Harvey / November 27, 2023

Understanding a Key Management Program The purpose of this presentation is to give you a foundation of understanding encryption. This webinar will not delve into the math involved, but rather, you will learn about the different types of encryption, key management basics, algorithm uses, and encryption attacks. First, let’s define and discuss symmetric versus asymmetric encryption. Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both…

Compliance is Never Enough: Hardening and System Patching

by Sarah Harvey / December 19, 2022

Best Practices for Patch and Vulnerability Management Programs 75% of the assessments that we do will generally have a finding regarding patching. So, what’s missing? What can we do to change that? In this webinar, Jeff Wilder discusses best practices for patch management programs, best practices for vulnerability management and identification programs, false assumptions about patching, risk ranking, and recommended tools.  Patch management should only be a part of…

Firewall and Router Management

by Sarah Harvey / December 19, 2022

Best Practices for Firewall and Router Management This webinar is not going to provide you with specific instructions on how to configure your individual devices. However, it will provide you with the individual attributes that you need to consider when developing your router and firewall security program. In this webinar, we will focus on discussing physical devices, running operating systems, and secure traffic rules.  If your goal is to fully…