Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ASM Turning Awareness into Actionable Defense || Sedara October Cyber Bytes Webinar by Julian

Watch the final session of Sedara’s October Cyber Bytes 2025 series — ASM: Turning Awareness into Actionable Defense with Julian Anjorin. In this webinar, Julian explores the importance of Attack Surface Management (ASM) as a foundational layer of any security program. Learn how understanding your organization’s full digital footprint helps identify blind spots, reduce exposure, and strengthen overall security posture.

Password Policy: A History of Getting It Wrong and how to do it right in 2025 | October Cyber Bytes

In this session, Sedara’s David Frier explores the fascinating history of password policies—how the industry went wrong in the early 2000s, and what we’re finally getting right in 2025. From outdated complexity rules to modern authentication standards, this webinar breaks down decades of password practices and reveals how organizations can strengthen security while making life easier for users.

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.

Disaster Recovery Best Practices | Webinar by Jason Taylor

Learn the fundamentals of Disaster Recovery in this insightful webinar led by Jason Taylor, Senior Cybersecurity Program Analyst at Sedara. He covers what disaster recovery is, common causes of disasters, response and recovery workflows (BCP, IR, and DR), the seven key steps to building a DR plan, recovery playbooks, and how to create an effective DR project plan. A must-watch for IT and security teams preparing for the unexpected.

NIST CSF 2.0: What you need to know by Jason Taylor

Join Jeson Taylor, Senior Cybersecurity Program Analyst, as he breaks down the key updates in NIST CSF 2.0 in this informative webinar. Gain valuable insights into what’s changed from NIST CSF 1.1 to 2.0, and what organizations need to know to stay aligned with the latest cybersecurity framework. This is the recording of our live webinar—perfect for anyone looking to understand the evolution of NIST CSF and how it impacts security programs moving forward.

A Comprehensive Approach to IT Vulnerability Management | Sedara Cyber Talks

In this insightful session, David Frier shares a comprehensive approach to IT vulnerability management, offering strategies to go beyond basic vulnerability identification. Learn how to enhance, risk-rank, and prioritize vulnerabilities for optimal remediation efforts.

Ask me Anything Webinar 004

Our Panel of CISOs In this interactive session, a panel of experienced CISOs—Frank D’Arrigo and Bob Chyka—answer pressing cybersecurity questions submitted by the audience. From threat management to security strategies, this session offers direct insights and expert advice from top industry leaders. Watch the recording to gain actionable guidance on protecting your organization, with practical advice on tackling today’s cybersecurity challenges.

Creative Approaches to Keeping Cybersecurity Awareness Engaging

In this recorded session, we explore innovative methods to make cybersecurity awareness both effective and engaging. Learn how to incorporate interactive training, gamification, real-world scenarios, and creative communication strategies to keep your team informed and vigilant against potential cyber threats. These fresh approaches will help foster a strong culture of security within your organization while keeping employees motivated and actively involved in maintaining cybersecurity.

Common Ways Hackers Break In: Vulnerabilities You Need to Fix

In this webinar, we explored the most common vulnerabilities that cybercriminals exploit to infiltrate systems. Topics included outdated software, weak passwords, misconfigured settings, and unpatched security flaws. We discussed which vulnerabilities pose the greatest risks and shared practical strategies to address them. Watch this recording to gain actionable insights into fortifying your defenses and reducing your organization's attack surface, which will help you stay ahead of potential breaches.