top of page

Nth Channel

The Nth Channel provides the most current cybersecurity education and thought leadership: presented by subject matter experts.

Join NTH GENERATION

ON THE AIR

for a

VIRTUAL, INTERACTIVE, EDUCATIONAL EVENT

VIRTUAL EVENT LIBRARY

The Nth Files, Episode 4 - Ransomware Readiness and Field Notes from the Experts ft. Derek Johnson
Play Video

Stay Tuned to the Nth Channel

Video Demo
Breaching Buildings
During the Pandemic

Recorded 03.03.22

Presentation by:

Jeromie-Jackson-Headshot-Crop.png

Jeromie Jackson

Director of Security & Analytics, Nth Generation

Office buildings are empty or at sparse capacities. "See something, say something" is limited when there are few eyes on the prize. This quick video featuring Jeromie Jackson, Director of Security & Analytics at Nth, shows how easy it is for thieves to compromise physical security credentials and breach your brick-and-mortar. Nth Generation Security professionals aid organizations in mitigating risk, both for cyber and physical security.

TechTalk: Cyber Security

Recorded 04.27.21

Hosted by:
LA Business Journal
Featuring our very own

Jeromie-Jackson-Headshot-Crop.png

Jeromie Jackson

Director of Security & Analytics, Nth Generation

The Los Angeles Business Journal and our panel of industry experts discussed how you could protect your business’ computer systems, networks, and data from theft or damage. They helped with loss prevention and provided insight on how to improve your business processes. Our heavy reliance on technology has made the importance of protecting your data, information, and communication more important than ever.

Navigating the Cares Act

Recorded 08.26.20

Hosted by:

nth generation

HEWLETT PACKARD ENTERPRISE

ooo What is the CARES Act?

ooo Are you eligible for funds?

ooo How do you apply?

ooo What are applicable use cases?

ooo Can you leverage funds for technology solutions?

The Coronavirus Aid, Relief and Economic Security (CARES) Act provides funding to offset expenditures as a result of the COVID-19 pandemic. Nearly $20B in funds are available for California Higher Education, K-12, State/Local Government, Healthcare! Find out how to get started and the steps involved.

Are the "New Normal" security vulnerabilities keeping you up at night?

Recorded 08.12.20

Hosted by:

nth generation

ARCTIC WOLF

BLACKBERRY CYLANCE

IVANTI

PROOFPOINT

ooo Are the "New Normal" security vulnerabilities keeping you up at night? And what about the enforcement of California’s new CCPA law starting on July 1st?

ooo Are you using AI-powered, next generation Anti-Virus technologies?


ooo Are you providing updated security awareness training to all employees?

ooo Are you aware of the growing number of potential new security vulnerabilities triggered by work-from-home?


ooo What are some of key security impacts of VDI vs. Desktop-as-a-Service vs. VPN?

THE "NEW NORMAL" CYBERSECURITY - ARCTIC WOLF FOCUS

Dennis Panella

Director Sales Engineering West, Arctic Wolf Networks

200708 LABJ Social@2x (1).png
THE "NEW NORMAL" CYBER SECURITY - BLACKBERRY CYLANCE FOCUS

Ryan Chapman

Principal Incident Response Consultant, Blackberry Cylance

200708 LABJ Social@2x (1).png
THE "NEW NORMAL" CYBERSECURITY - IVANTI FOCUS

Chris Goettl

Director of Product Management, Security, ivanti

200708 LABJ Social@2x (1).png
THE "NEW NORMAL" CYBERSECURITY - PROOFPOINT FOCUS

Ryan Kalember

Executive Vice President, Cybersecurity Strategy, Proofpoint

200708 LABJ Social@2x (1).png

Defend Against Your #1 Cyber Threat: AI for Enhanced Email Security

Recorded 04.23.20

Hosted by:

nth generation

darktrace

With 94% of cyber-attacks originating via email, perimeter solutions no longer suffice.

Learn how to quickly deploy advanced, AI-powered security. 

 

FEARWARE

What is it and how are cyber-criminals capitalizing on it? 

DEEP FAKE PHISHING EMAILS

Learn how to pre-empt these attacks and act early to stop them. 

CYBER AI FOR EMAIL

How can you gain oversight on email threats, within the full context of the digital business? 

Innovative, Secure, 
Work-from-Home and Business Continuity Solutions:
DAY 1

Recorded 05.06.20

Latest Cybersecurity threat trends related to increased remote work and COVID-19

ooo How can advanced Security technologies and possible 24/7 managed security services help you, as the country faces extraordinary circumstances and drastically increased security threats?

ooo Learn from 8 leading technology providers

ooo Rapid Fire

Innovative, Secure, 
Work-from-Home and Business Continuity Solutions:
DAY 2

Recorded 05.07.20

Hosted by:

nth generation

varonis

BLACKBERRY cylance

cRADLEPOINT

veeam

Latest Cybersecurity threat trends related to increased remote work and COVID-19

ooo How can advanced Security technologies and possible 24/7 managed security services help you, as the country faces extraordinary circumstances and drastically increased security threats?

ooo Learn from 8 leading technology providers

ooo Rapid Fire

WORK FROM HOME SOLUTIONS - FORTINET FOCUS

Tune into Fortinet's discussion on the growing need for Teleworking Solutions.

fortinet.png
WORK FROM HOME SOLUTIONS -
ARCTIC WOLF FOCUS

Arctic Wolf talks about the fundamental security challenges in remote working.

arctic wolf.png
WORK FROM HOME SOLUTIONS -
HPE FOCUS

Hewlett-Packard discusses solutions from HPE for business in uncertain times.

hpe.png
WORK FROM HOME SOLUTIONS -
iland FOCUS

iland talks about the COVID-19 impact on IT and how to secure yourself remotely.

iland.png
WORK FROM HOME SOLUTIONS - CRADLEPOINT FOCUS

Cradlepoint dives deep into Emergency Network Response during COVID-19.

cradlepoint.png
WORK FROM HOME SOLUTIONS -
VARONIS FOCUS

Varonis discusses how to defend your company in a remote workforce.

Varonis.png
WORK FROM HOME SOLUTIONS - BLACKBERRY 
CYLANCE FOCUS

Blackberry Cylance discusses their Endpont Protection Platform.

dARKTRACE@2x.png
WORK FROM HOME SOLUTIONS -
VEEAM FOCUS

Veeam outlines how they can prevent ransomware attacks  while working remotely.

veeam.png
bottom of page