top of page
Writer's pictureNth Generation

Are the “New Normal” security vulnerabilities keeping you up at night?

Updated: Feb 22, 2022



Join Nth Generation for another highly technical security event on Wednesday, August 12th, 11:00 am – 12:15 pm PT. Don’t miss presentations from some of the hottest current security technologies: Ivanti, Blackberry Cylance, Proofpoint and Arctic Wolf.


AGENDA 11:00 am - Presentations:

  • Nth Generation: Nth Generation provides industry leading, consultative IT services, encompassing a suite of IT and security solutions.

  • Ivanti: 60% of breaches involved vulnerabilities for which a patch was available but not applied. Ivanti assists in patch management across applications and helps organizations succeed through the Power of Unified IT.

  • Blackberry | Cylance: Revolutionizing cybersecurity with AI based solutions that predict and prevent execution of advanced threats and malware at the endpoint.

  • Proofpoint: 94% of malware is delivered via email. Proofpoint provides the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

  • Arctic Wolf: Dynamic 24x7 cybersecurity protection tailored to the specific needs of your organization.

11:50 am - Live Q&A​: Ask the Subject Matter Experts Submit a Completed Event Survey for Raffle Entry


*This format is subject to change. All times PT.

Are the “New Normal” security vulnerabilities keeping you up at night? Automated data breaches are increasing in both accuracy and approach. Unfortunately, Artificial Intelligence (AI), Machine Learning (ML), and advanced technologies aren’t exclusive to “white hats”.

Nearly 5,000 active FBI counterintelligence cases are currently underway across the USA, coming primarily from China and other nation states, working to compromise American organizations.


"China promised to retaliate against 'U.S. institutions and individuals' after President Trump signed legislation and an executive order sanctioning Beijing for imposing a sweeping new national security law on Hong Kong." Source


  • Are you aware of the growing number of potential new security vulnerabilities triggered by work-from-home?

  • What are some of key security impacts of VDI vs. Desktop-as-a-Service vs. VPN?

  • Are you using AI-powered, next generation Anti-Virus technologies?

  • Are you providing updated security awareness training to all employees?

  • Are you aware the CCPA statute went into effect July 1st? Do you need a CCPA readiness assessment?

According to the FBI: "The greatest long-term threat to our nation’s information and intellectual property, and to our economic vitality, is the counterintelligence and economic espionage threat from China. It’s a threat to our economic security—and by extension, to our national security." Source

Hosted by: Nth Generation


Sponsored by: Arctic Wolf, BlackBerry Cylance, Ivanti, and Proofpoint


About Nth Generation Nth Generation provides industry leading, consultative IT services, encompassing a suite of IT and security solutions. Whether your need or initiative is IT security; governance, risk mitigation, and compliance; cloud computing/XaaS; managed services; hyper-converged infrastructure; networking; hybrid IT; IoT; edge computing; automation; artificial intelligence; or other transformative solutions; Nth offers proven expertise to be your trusted industry advisor. Learn more at Nth.com.

57 views0 comments

Recent Posts

See All

Comments


bottom of page