Resource Library

Webinars & Videos

For upcoming live webinars please visit our Events Page.


Webinars

SharePoint - Dynamic Collaboration and Encryption

SharePoint file encryption/decryption and Microsoft RMS can bring SharePoint performance to a halt – and these security measures can greatly impede user collaboration.

But you need to secure your SharePoint content! What can you do?

This presentation describes how every organization can secure their SharePoint and Office 365 files – at rest, and in transit. 

Learn More

SharePoint - Dynamic Collaboration and Encryption Webinar

SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access

Perimeter-based security, NAC’s, firewalls and VPNs are ineffective against malicious insiders, over-privileged users, and compromised third-party access.

What can you do?

This presentation describes how the Software-Defined Perimeter’s zero-trust security model provides capabilities to protect against modern IT security threats.

Learn More

SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access Webinar

Rapid Web Accessibility and Continued Success

WCAG 2.0 AA is fast becoming a worldwide web accessibility standard.

This webinar outlines how to ensure your current – and future – web content complies.

Learn More

Rapid Web Accessibility and Continued Success Webinar

Dynamically Securing SharePoint Content – Easily and Quickly

How can you easily ensure only the right people can access, collaborate or distribute SharePoint content? How about O365 or OneDrive repositories?

This webinar discusses best practices to secure SharePoint content for common scenarios that require capabilities beyond what Microsoft provides.

Learn More

Dynamically Securing SharePoint Content – Easily and Quickly Webinar

Simplified Network Security across Physical, Virtual and Cloud-Based Systems

How can you unify and simplify secured network access control and compliance across hybrid systems?

This webinar describes The Cloud Security Alliance’s new security model, the Software-Defined Perimeter, designed to secure access to today’s hybrid physical, virtual and cloud systems. 

Learn More

Simplified Network Security across Physical, Virtual and Cloud-Based Systems Webinar

Website Accessibility Testing - What to Know for Successful Testing

How do you efficiently test that your website is accessible to individuals with disabilities?

This webinar describes lessons learned building effective accessibility testing frameworks and how to avoid pitfalls that plague many accessibility testing efforts.

Learn More

Website Accessibility Testing - What to Know for Successful Testing Webinar

How to be an Effective CISO: Lessons Learned from two Experts

Listen to this 20-minute podcast to gain perspective on improving your effectiveness as a CISO from Mark Arnold, now Senior Research Principal, Solutions R&D at Optiv, Inc. and Leo Taddeo, CSO for Cryptzone. We guarantee that you’ll leave the podcast with a few ideas that you can put to work today!

Learn More

How to be an Effective CISO: Lessons Learned from two Experts Webinar

AWS Security – Simplify, Scale, & Secure User Access

How can you simplify the process of securing user access to AWS systems for your organization’s employees, contractors and third-parties?

This webinar will discuss lessons learned and new approaches to secure and audit user access to AWS – while also improving IT operational agility.

Learn More

AWS Security – Simplify, Scale, & Secure User Access Webinar

Website Accessibility - A Program to Reduce Litigation Risk

So-called “ADA letters” – letters sent by law firms alleging individuals with disabilities are denied access to an organization’s goods and services because of inaccessible websites – are increasing.

And the number of related lawsuits filed in federal court this year has surged.

What can you do?

This webinar describes specific steps to take to reduce your website accessibility litigation risk.

Learn More

Website Accessibility - A Program to Reduce Litigation Risk Webinar

Securing Files for All Users, All Devices, All Locations - In Any SharePoint Environment

SharePoint’s native security does a lot. But many common collaboration scenarios require additional security capabilities beyond what SharePoint provides.

What can you do?

This webinar discusses how to secure files for all users, all devices, and all locations -- in any SharePoint environment.

Learn More

Securing Files for All Users, All Devices, All Locations - In Any SharePoint Environment Webinar

Reducing PCI Scope and Effort with a Software-Defined Perimeter

Learn how SageNet, a managed services provider managing 160,000+ customer locations, helped a convenience store chain with 600+ locations improve security and reduce PCI audit scope by more than 50% using Cryptzone’s AppGate. 

Learn More

Reducing PCI Scope and Effort with a Software-Defined Perimeter Webinar

EU GDPR - Worldwide IT Compliance & Security Implications

Starting May 2018, any company managing data about EU citizens can be fined up to 4% of global company revenues if found to be non-compliant with the EU’s new General Data Protection Regulation (GDPR). 

Will your IT systems and data processes be ready?

Learn More

EU GDPR - Worldwide IT Compliance & Security Implications Webinar

Network Access Control vs. Software-Defined Perimeter – or both?

Network security is changing.

Learn why leading organizations are rapidly adopting a Software-Defined Perimeter instead of a traditional Network Access Control security model.

Learn More

Network Access Control vs. Software-Defined Perimeter – or both? Webinar

Website Liability Under US Accessibility Laws

Civil rights laws like the American Disabilities Act (ADA) require that businesses offer people with disabilities the same access to content and information as everyone else.

Ken Nakata, a former Senior Trial Attorney with the U.S. Department of Justice and who has specialized in accessibility for the last 24 years, discuses this topic

Learn More

Website Liability Under US Accessibility Laws Webinar

SharePoint Migration – Securing data on premises, online and anywhere in between

SharePoint Online and Office 365 migration projects can be complicated, often because of information security concerns. So, how can you simplify and accelerate the process by applying security and privacy policies early in the transition?

This webinar will show you how.

Learn More

SharePoint Migration – Securing data on premises, online and anywhere in between Webinar

From CNBC to You - Leo Taddeo Podcast

This podcast features a lively Q&A session with Leo Taddeo, Cryptzone’s CSO and former FBI Agent in Charge of the Special Operations/Cyber Division of the New York office. The discussion ranged from the state of cybercrime to discussing the benefits of a software-defined perimeter approach to network access, and more!

Listen to the Podcast here!

From CNBC to You - Leo Taddeo Podcast Webinar

Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS

Join us to learn more about how AppGate XDP can simplify your IaaS security challenges and discuss the following topics:

  • The trend toward IaaS
  • The benefits of cost savings in a dynamic and elastic environment
  • IaaS enables technical and business agility – DevOps
  • Security for IaaS isn’t easy - IaaS tools are not user-centric, and are all-or-nothing
  • Software Defined Perimeter for IaaS can help

Learn More

Protecting the Cloud: How a Software-Defined Perimeter Secures IaaS Webinar

Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security

This Webinar will give information on traditional access control solutions typically provide all-or-nothing network access, which has led to the security gaps behind many of today’s headline-making breaches.

Cryptzone recently released a new product, AppGate XDP, which closes this gap through dynamic, attribute-based controls that determine access across cloud, virtual and physical infrastructures.

Learn More

Webinar: How a ‘Segment of One’ Can Simplify and Strengthen Network Security Webinar

Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag

This webinar will identify the limitations of existing security solutions and show how implementing the "Zero Trust" architecture will help build security into your network's DNA.

Learn More

Webinar: All Cybercrime is an Inside Job featuring Forrester Analyst, John Kindervag Webinar

The Software Defined Perimeter: Creating an Invisible Infrastructure

During this on-demand webinar, you’ll learn:

  • How IT and security teams are evolving their approach to access control to solve the increased threat posed by stolen credentials
  • What a software defined perimeter (SDP) is and how it can solve evolving access control needs
  • How to make your applications and server infrastructures effectively “invisible” to limit threats

Learn More

The Software Defined Perimeter: Creating an Invisible Infrastructure Webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks?

Control Privileged User Access While Simplifying Deployment And Management

During this webinar you'll learn:

  • How to apply a Zero Trust Strategy
  • How to make non-authorized network resources invisible to cyber criminals
  • Solutions to protect your business

View the On-Demand webinar

Stolen Privileged User Credentials: How can you protect your network from privileged user attacks? Webinar

Short Videos

AppGate for AWS

Find out how AppGate for AWS can help you

 

What is Security Sheriff?

Check out this 2 minute explanation of Security Sheriff! 

 

Leo Taddeo Interview at Black Hat - Dark Reading News Desk

Leo Taddeo - CSO of Cryptzone interview at Black Hat 2016

 

What is AppGate?

Check out this 2 minute explanation of AppGate!

MS Ignite 2016 - Paul Campaniello Interview

Paul Campaniello, CMO of Cryptzone, is interviewed at MS Ignite 2016 by David Kaufman