Webinars

Webinar: A CISO’s View on Incident Response – Decreasing the Risk Gap

Thu, Feb 14, 2019 10:00nca business home AM - 11:00 AM PST

 Register

A CISO’s View on Incident Response – Decreasing the Risk Gap

The role of the CISO is no longer just keeping your name out of the newspaper. It's about positively impacting the bottom line of the business.
Learning how to close the risk gap in current security operations is critical to the health of your organization.

This webinar features:

  • Yaron Levi, CISO at Blue Cross & Blue Shield of Kansas City
  • David Cahoon, VP of Security Services at NCA
  • Phil Campeau, Systems Engineer, WireX Systems

Join NCA to learn how to maximize the cost-efficiency of your incident response performance and decrease the risk of business disruption.

 Register

Webinar: Understanding the Evolving Threat Landscape & Risk to Your Business

Network Security Network Computing Architects Inc. NCA fortinet webinar smThu, Feb 21, 2019 10:00 AM - 11:00 AM PST

IT security threats are growing by the day, and enterprises of all sizes need firewall management services they can rely on. Selecting a trusted security partner to lead your firewall is the fastest way to get peace of mind so you can focus on what your business does best.

From a technical perspective, your firewall is the first line of defense. NCA provides powerful, effective firewall management services using the latest in perimeter defense and active intrusion detection.

When it comes to security, good firewall management services are your best investment. When you choose NCA, you have the opportunity to benefit from the same cutting-edge technology used by the top Fortune 500 firms. Plus, it’s all backed by our decades of expertise.

We are hosting an informative security discussion on the latest hacks and preventive steps with industry leading experts in threat intelligence from FortiGuard Labs.

Please join us!

 Register

Webinar: Understanding Fileless Attacks and How to Stop Them

computer attacks webWednes. March 27th, 2019 10:00 AM - 11:00 AM PST

Understanding Fileless Attacks and How to Stop Them

 Register

Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk.