JaY Walkin Episode 1: Conferring on Conferences

JaY Walkin

Join Joel Fulton, CEO of Lucidum, and Yaron Levi, CISO of Dolby, for the first episode of JaY Walkin. Where Joel and Yaron walk in front of the traffic of security to discuss security, leadership, and everything in between while avoiding being hit by the threat bus. In this episode of JaY Walkin, Joel and […]

What Is Cybersecurity and What Are the Main Types?

What is cybersecurity?

[et_pb_section fb_built=”1″ make_equal=”on” specialty=”on” admin_label=”Section” _builder_version=”4.17.4″ _module_preset=”default” custom_css_main_element=”align-items:center;” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text module_class=”h2-heading-responsive” _builder_version=”4.17.6″ _module_preset=”default” header_2_font=”|600|||||||” header_2_font_size=”24px” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_padding=”30px||30px||true|false” global_colors_info=”{}”] EBOOK What Is Cybersecurity,and What Are the MainTypes of CybersecurityUsed Today? [/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.17.1″ […]

What Do Emerging Organizations Need to Know to Get Serious About Cybersecurity?

What Emerging Organizations Need for Cybersecurity

[et_pb_section fb_built=”1″ make_equal=”on” specialty=”on” admin_label=”Section” _builder_version=”4.17.4″ _module_preset=”default” custom_css_main_element=”align-items:center;” global_colors_info=”{}”][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text module_class=”h2-heading-responsive” _builder_version=”4.17.6″ _module_preset=”default” header_2_font=”|600|||||||” header_2_font_size=”24px” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_padding=”30px||30px||true|false” global_colors_info=”{}”] EBOOK What Do Emerging OrganizationsNeed to Know to Get SeriousAbout Cybersecurity? [/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.6″ _module_preset=”default” custom_margin=”||13px|||” global_colors_info=”{}”] […]

An Inside Look at Defending the Black Hat Network

Lucidum & Black Hat Networ Security Webinar

[et_pb_section fb_built=”1″ make_equal=”on” specialty=”on” admin_label=”Section” _builder_version=”4.17.4″ _module_preset=”default” custom_css_main_element=”align-items:center;” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text module_class=”h2-heading-responsive” _builder_version=”4.17.6″ _module_preset=”default” header_2_font=”|600|||||||” header_2_font_size=”24px” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_padding=”30px||30px||true|false” global_colors_info=”{}”] ON-DEMAND WEBINAR An Inside Look atDefending the Black Hat Network [/et_pb_text][et_pb_text _builder_version=”4.17.6″ _module_preset=”default” […]

An Inside Look at Defending the Black Hat Network – TY

Lucidum logo and tagline

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”row” _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_code _builder_version=”4.17.6″ _module_preset=”default” global_colors_info=”{}”] [/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section]

Cybersecurity in the Merger & Acquisition Process – TY

[et_pb_section fb_built=”1″ _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”] Enjoy the On Demand Webinar [/et_pb_text][et_pb_text _builder_version=”4.17.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”] [/et_pb_text][et_pb_cta title=”Want to see how we can help keep you safe during a merger or acquisition? Schedule […]

Cybersecurity in the Merger & Acquisition Process

[et_pb_section fb_built=”1″ make_equal=”on” specialty=”on” admin_label=”Section” _builder_version=”4.17.4″ _module_preset=”default” custom_css_main_element=”align-items:center;” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_column type=”1_2″ specialty_columns=”2″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column_inner saved_specialty_column_type=”1_2″ _builder_version=”4.17.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text module_class=”h2-heading-responsive” _builder_version=”4.17.4″ _module_preset=”default” header_2_font=”|600|||||||” header_2_font_size=”24px” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” custom_padding=”30px||30px||true|false” global_colors_info=”{}”] ON DEMAND WEBINAR Cybersecurity in theMerger & Acquisition Process [/et_pb_text][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” custom_margin=”||13px|||” […]