Horizon3.ai
Horizon3.ai

Webinar

  1. Events
  2. Webinar

Views Navigation

Event Views Navigation

Today

Fireside Chat Series with our guest Komori

Zoom Webinar

Horizon3.ai is pleased to announce that we are hosting a Virtual Fireside Chat Series so you can tune in and hear firsthand from security leaders and industry experts about cybersecurity topics that matter most to organizations today.  

In this episode, you will be hearing from: 

Andy Katz, Director of IT at Komori America Corporation 

Andy's tenure at Komori stretches back almost 30 years, coming to Komori as a technical product manager for pre-press products back in 1996. In 2006 he took on the role of IT manager to help implement a new ERP system at Komori. That role expanded to encompass all of IT as a hands-on Director, and includes responsibility for physical and logical infrastructure, networking, cybersecurity, vendor and contractor management, staffing, budgeting, and both strategic and tactical planning and deployment. 

In this Fireside Chat episode, you will learn: 

How things have dramatically changed in Andy’s adaptation of IT technology usage and implementation in their environment.  
What Andy sees as the greatest cyber threats to their own company and what he’s experienced firsthand. 
Why Komori selected NodeZero to help secure their environments and what were some of Andy’s initial observations.  

This Fireside Chat Series is designed to help security leaders and practitioners learn about the latest trends, experiences, services, and technologies that are making a difference in the fight against cybercrime.  

Strengthening Cloud Security: A Comprehensive Approach

Zoom Webinar

In the evolving landscape of cloud and hybrid environments, robust security measures are more critical than ever. In this webinar Brad Hong, CISSP, will explore autonomous pentesting methodologies and strategies that can help your organization take a more efficient and comprehensive approach to securing your entire digital infrastructure that embraces multiple cloud vendors.

Detection Done Differently

Zoom Webinar

As cyber attacks become increasingly complex, sophisticated, and more frequent, security teams need to be able to identify attacks faster and with higher accuracy. But users report that current detection workflows have high set-up and maintenance needs and introduce lots of noise and time-consuming false-positives. In this session, we’ll highlight new approaches to overcome those drawbacks:

- Why rapid threat detection is increasingly critical for every security team in today’s threat landscape.
- A new approach to threat detection that doesn’t increase your team’s workload.
- A preview of how NodeZero Tripwires helps you detect threats faster and accurately.

You can also participate in the live Q & A with our expert panel.

Revolutionize Your Security with Autonomous Pentesting

Zoom Webinar

Join us on October 30th at 12:30 PM EST to hear Horizon3.ai Offensive Security Expert Phil Wylie discuss the benefits of continuous security validation through autonomous pentesting with our special guests from Foresite, Regional Sales Director Jodi Madsen and Chuck Flynn.

During this session you will learn:
- Critical differences between traditional and autonomous pentesting
- Financial impact of taking a continuous validation approach
- Security services that support our customer's success.

Maximizing Offensive Security: Addressing Shortcomings and Improving Effectiveness

Zoom Webinar

Offensive security is essential for identifying and exploiting system vulnerabilities, but current practices often have gaps that reduce their effectiveness. This presentation will explore these deficiencies and offer practical strategies to enhance the accuracy and impact of offensive security assessments, ultimately improving the overall effectiveness of security programs.

Uncover Kubernetes Security Weaknesses with NodeZero™

Zoom Webinar

Step into an engaging discussion with Kubernetes security experts as we explore how this container orchestration tool’s superpower in enabling scalable and available assets for organizations can be used against itself to pave a critical attack path into the underlying infrastructure.