Learn first hand from CSSI how our comprehensive service offerings and partners provide seamless solution for every infrastructure need. Come speak to us in person at these events or contact us now.
Discover, Detect, & Defend
Your Data Against Ransomware
Lunch and Learn with CCSI, STEALTHbits, and Unitrends
October 4, 2017, 11:30 am – 2:00 pm at Liberty Prime Steakhouse
Do you know where your critical data is and who’s accessing it? Are you prepared to recover from loss of sensitive data? Is ransomware a concern? At this lunch and learn we’ll discuss methods to discover where your data rests, who’s accessing it and how to prepare and recover in the event of data loss.
Discover What You Truly Need To Know About
23 NYCRR 500
Webinar with CCSI and STEALTHbits
October 24, 2017, 1:00 pm – 2:00 pm EDT
Is your covered entity required to comply with 23 NYCRR 500? Many companies don’t know where to start or if they have to comply under this regulation.
Together, CCSI and STEALTHbits Technologies will address what you truly need to know about 23 NYCRR 500. STEALTHbits’ Gabriel Gumbs, VP of Product Strategy, will be joined by CCSI’s Matthew Pascucci, Cybersecurity Practice Manager, to provide actionable insights into the regulation and how you can better prepare your organization.
In this workshop, Matthew and Gabriel will cover:
- What is the regulation and what deadlines you need to meet
- The tools necessary to meet compliance
- A demonstration of the StealthAUDIT Management Platform
- How to operationalize privacy by design and by default
Don’t Miss This Informative Webinar!
NYS DFS Cybersecurity Regulation Phase 1
a CCSI Webinar
August 29, 2017, 1:00 pm – 2:00 pm EDT
CCSI will be hosted the first of four webinars on the New York State’s Department of Financial Services (DFS) 23 NYCRR 500 Regulation, otherwise known as NYS DFS Cybersecurity regulation. Each webinar will discuss the corresponding NYS DFS transitional period, reviewing what’s needed for each transition, and how to stay compliant throughout the entire process. This webinar Matthew Pascucci, Cybersecurity Practice Manager for CCSI, discussed the first transitional phase.
AI and the Future of Cybersecurity
Analyzing & Identifying Cybercrime
a CCSI and Darktrace Webinar
August 17, 2017, 11:30 am – 12:30pm EDT
In today’s world, it is critical to be proactive. Ransomware, malware, insider threat, and IoT are evolving rapidly, which means that prevention tactics must keep up and evolve at an equally rapid pace. Zero day attacks can be detected and prevented when businesses incorporate AI and Machine Learning into their cyber defense strategy. In is Webinar, Darktrace’s Director of Cyber Intelligence and Analysis, Justin Fier, provided an in-depth discussion on today’s cyber threat landscape and how attacks are being detected and remediated through the use of artificial intelligence.
The Modern Day DDoS Attack:
How Vulnerable is Your Organization?
a CCSI and Arbor Networks Webinar
June 27, 2017, 11:30 am – 12:30pm
Join CCSI and Arbor Networks for this informative webinar. Tom Bienkowski, Director of Product Marketing from Arbor, will be discussing the complexity of the modern day DDoS attack, which is commonly a dynamic combination of volumetric, TCP state exhaustion and application layer attack vectors. Making matters worse, DDoS attacks have evolved to weaponize the Internet of Things (IoT) botnets — such as the Mirai botnet. This webinar will discuss the evolving DDoS threat, how organizations are vulnerable, and best practices in protection. At the end of the webinar all attendees will be offered a free assessment designed to expose hidden threats lurking in their environments.
Webinar: Defeat Ransomware with Managed Services
May 11, 2017, 10:00 am – 10:30am
In today’s world, it’s critical to be proactive of the multi-faceted cyber threats business’s face. Organizations must be aware of the diverse cyber threats their business faces and in protecting their clients, data, networks and operations from theft and disruption. Cybersecurity is a major area of risk that must be actively monitored and managed 24x7x365. This CCSI webinar will review what is going on in the industry and techniques to identify a cyber threat before it is pronounced.
Technical Session with Hands-on Demo of FortiGate
May 3, 2017, Evening Session, at CCSI Solution Center in Bohemia, NY
Enjoy lunch and have a technical discussion with CCSI and Fortinet. Have a hands-on demo of the FortiGate platform and configure your own firewall. Discuss security profiles, the building blocks of a granular security profile, and various types of security profiles available.
- Fortigate next gen firewalls are optimized for internal segmentation, perimeter, cloud, data center, distributed, and small business deployments.
- Simplify your security posture with one security solution across all deployments.
Demystifying Cloud and Options around Risk Mitigation
April 27, 2017, 12:00 pm – 2:00 pm, at Blackstone Steakhouse in Melville, NY
CCSI and our partner Unitrends discussed cloud services and how it can help with risk mitigation. Cloud solutions like DRaaS can turn back time against a ransomware attack and get your company back on track.
Ransomware: How to Protect and Defend Your Organization
March 9, 2017, 11:45 am – 2:00 pm, at Ruth’s Chris Steakhouse New York, NY
Ransomware has become top of mind as recent attacks are plastered across the news. It is a significant threat to organizations, but it’s far from the only insidious threat out there.
As for combatting Ransomware, it’s actually pretty easy. Learn how to manage this threat in several ways:
- Web filtering
- Application Control Botnet C&C traffic blocking
- AV Scans
Are You Addressing Your Cloud Security Risk?
January 19, 2017, 11:30 am – 1:30 pm, at Blackstone Steakhouse Melville, NY
You can’t have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. Using cloud services now requires abdicating some control over how systems and data are protected.