Savid takes pride in the knowledge and information that our team produces. Each time we do a webinar or interview we record it and put it on this page for you to watch and learn from our expertise.
A Crash Course In Employee Security Awareness, in this training session we will teach you the most current and effective employee security awareness training techniques.
The Art and Science of Penetration Testing, we will teach you how Penetration Testing can quickly find the highest risk vulnerabilities by taking a peek behind the scenes at what an Ethical Hacker can do.
10 Ways To Increase Security Effectiveness While Reducing Cost In this training session we will teach you which common information security practices bring relatively little value to an organization.
Breaking Down the Barriers of GRC In this training session we will teach you how to achieve a 25% reduction in redundant risk management processes and activities.
Top 3 Reasons IDM Projects Fail Identity Access Management can increase security while reducing the cost of managing users and reduce the number of usernames and passwords they have to remember.
Tales From The Trenches: Baking Security Into App Dev Watch this training session and learn techniques and tips to protect you from the costly exposures caused by security flaws in software applications.
How To Audit Cloud Providers Watch and learn how to properly audit cloud providers to reduce the security risks of using the cloud.
Ensure a Fool Proof Incident Response Plan Watch this on-demand webinar and learn what constitutes a comprehensive and effective set of Incident Response Plan testing exercises and drills.
The Least Expensive Software Security Vulnerability Watch this on demand webinar to find out what your developers need to know about developing software securely.
Building and Effective Information Security Program Watch this on demand webinar and receive direction on developing a high level strategy and plan for your company’s Information Security Program.
Employee Security Awareness
Watch this on demand webinar and learn the most current and effective employee security awareness and training techniques
Pen Test Best Practices
Penetration Testing can quickly find the highest risk vulnerabilities but most companies don’t perform penetration testing properly and don’t get much benefit. Watch this webinar to see how you can use the right tools to quickly find vulnerabilities.
How to Achieve ISO 27001 Compliance
This on demand webinar will tell you how to achieve ISO 27001 compliance. It will also give you insight on how to reduce the likelihood of loss and exposure.
Securing Your Admin Accounts
Discover how to reduce the likelihood of loss and exposure while learning how to improve efficiency and security with automation.
How To Managed And Secure Your Mobile Devices
Stop fighting between Apple, Google, and RIM! Learn how to manage and secure the growing number of mobile devices in your organization including iPhone, iPad, Android, Blackberrys, and more.
Proper Risk Assessment
Only 32% of organizations have effective risk assessments, learn how to perform Risk Assessments properly by looking at 5 areas of risk and utilizing the right metrics, tools, and interview questions.
Top 10 Mobile Application Risks
Learn how to strategically approach mobile security, so you can stay one step ahead of attackers.
Top 5 Ways to Secure Applications Without Source Code
We discuss why source code is no longer required to identify security flaws and how to build an application security program specific to your organization while reducing operational costs and staff requirements.
Top 10 Risk Assessment Best Practices
48% of organizations fail to link risk to budget. Let us show you how to do it right! Watch our on-demand webinar Top Ten Risk Assessment Best Practices and learn the newest trends in risk management that must be in your risk assessment process. BONUS: How to properly prioritize remediation. HINT: It isn.t always by risk!
Virtualization Security in the Real World
Michael A. Davis, CEO, discusses the current issues in securing virtualized environments, what to look out for, and what really works in reducing the risk of attacks within a virtualized environment.