Events
Cynet All-in-One Cybersecurity Platform: Technical Demo and Deep Dive
Join Cynet’s cybersecurity experts for an in-depth technical demonstration of their revolutionary All-in-One platform. In this webinar, you’ll get an insider’s look at how Cynet’s unified solution can transform your organization’s security posture.
Empowering Victims of Cybercrime: A Joint Initiative by Victims of Cybercrime and The Cyber Helpline
During this session, representatives from TCH will share insightful statistics and information about their charity’s impact and the support they provide to victims. We will also delve into the Canadian cybercrime landscape, highlighting our goals and initiatives to enhance cybersecurity and support victims across the country.
On-demand webinars
Cynet 360 AutoXDR™ for Cybersecurity Compliance
In today’s ever-evolving threat landscape, endpoint security is no longer optional. This webinar dives deep into the importance of robust endpoint protection and explores how Cynet’s innovative solution can safeguard your organization from modern cyberattacks.
CAN CIOSC 104:2021 Certification
Join us for our CAN CIOSC 104:2021 Certification webinar, an essential program for organizations seeking to bolster their cybersecurity posture. This certification is a critical step towards safeguarding your digital assets in today’s ever-evolving cyber landscape.
Secure Authentication
Have you ever wondered how to effectively manage multiple identities and passwords in today’s increasingly complex digital landscape? Don’t worry, you’re not alone!
Authentification Sécurisée
Joignez-vous à nous le 19 juillet 2023, à 11 h HAE, pour un webinaire intitulé ” La gestion des identités et des accès (GIA) “, présenté par Okta et Cybersécurité Canada. Notre conférencier invité, Louis Migault, expert en GIA chez Okta, vous guidera à travers les tenants et aboutissants de la gestion de l’identité et de l’accès (GIA).
Aftermath of Ransomware
Organizations of all sizes are becoming aware of what the typical ransomware attack means: public shaming, news coverage, extortion and a lot of private data being shared publicly. What we know for certain is, ransomware attacks have significant and negative consequences on businesses, resulting in the loss of sensitive data, as well as causing operational downtime.
Secure Your Portable Devices
Learn more about the most common risks facing USB, smartphones, and other portable devices – and how to mitigate them. Whether you’re an individual or a business, register now and take the first step toward securing your digital future!
Why Are DNS Controls and Filtering Crucial For Your Business?
Ready to level up your cybersecurity game? Watch our webinar on DNS controls and filtering and gain a comprehensive understanding of the critical elements of internet assets, domains, servers, and DNS. Uncover the truth behind DNS misconceptions, learn about the basics of DNS, and who manages and controls it. Find out how checking and validating internet assets can lead to a secure organization, and the importance of secure DNS.
Anatomy of a Pentest
In this talk we will leave our hoody in the dresser and put on business casual attire to dive into the penetration testing process: from initial client engagement to report writing. We will look more closely at what penetration testing is, the various kinds of it, and how it may assist users in safeguarding, data and IT systems. Whether you’re an aspiring or a seasoned hacker, a manager, or an executive, you will get value in understanding or reviewing how a penetration testing engagement flows.
5 Steps to Prepare Your Company for CyberSecure Canada Certification
In this 30-minute live webinar, we’ll suggest practical steps that you can take to get started (often the most difficult part) on your CyberSecure Canada certification journey.