Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Planning Your Application Ecosystem Landscape to Withstand Multi-Layered Attack Vincent Amanyi, Architect Applications, SaskTel International This talk will detail how to plan your application ecosystem landscape to withstand multi-layered attack. Key Takeaways: • Understand which tools are... 3 months ago | 46 mins Part 3 | Move Beyond Attack Simulation to Validate Security Effectiveness Mandiant Security Validation Experts In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of alignin... 11 months ago | 38 mins Hacker erklärt: im Schatten des Domain Controllers - DCSync & DCShadow [German] Yves Kraft, Penetration Tester & Security Consultant, BSc FH CS, ISO 27001 Lead Auditor, OSCP, OPST, OSSTMM Trainer In diesem Webinar werden zwei populäre Attacken auf Domain Controller in Windows-Umgebungen vorgezeigt und detailiert erklärt. Dabei handelt es sich u... 1 year ago | 97 mins Ransomware's Unceasing Scourge: Lessons Learned within the EMEA Region Jamie Collier, Mandiant Threat Intelligence Consultant and Jay Christiansen, Mandiant Manager Consultant 2021 saw ransomware ascend to policymakers’ agendas, CISO’s darkest nightmares and real world pipelines, but what will the ransomware threat landscape... 7 months ago | 61 mins Align Security Validation with MITRE and Att&CK Framework Mandiant Security Validation Experts In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of alignin... 1 year ago | 38 mins How to maximize Microsoft Defender ATP configuration using Attack Simulations Hadar Feldman, Sr. Program Manager/Security Researcher, Microsoft and Valeriy Leykin, Director Product Management, SafeBreach For security teams, it’s critical to validate the efficacy of endpoint security against leading threats in real-world scenarios. In the Microsoft Defe... 2 years ago | 33 mins SolarWinds and Beyond: Validate That Your Controls Aren’t Vulnerable to a Supply Itzik Kotler, CTO and Tomer Bar, Research Team Lead The Cybersecurity and Infrastructure Security Agency (CISA) issued an Active Exploitation notice against highly sophisticated, manual supply chain att... 2 years ago | 29 mins Align Security Validation with MITRE and Att&CK Framework Mandiant Security Validation Experts In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of alignin... 10 months ago | 38 mins Crossing The Digital Transformation Chasm Shailesh Manjrekar, Sr. Director, Product & Solutions at Vexata, Frederic Van Haren, Senior Analyst at Evaluator Group Leverage Vexata Active Data Fabric Ecosystem for AI, Deep Learning, Machine Learning and Cognitive Pipelines Digital Transformation is cutting across... 5 years ago | 58 mins How does a DevOps simulation work? Jaro Tomik, Channel Account Manager at G2G3 & Gijs-Jan Huisman, Managing Director, Pink Elephant EMEA With over 50% of large IT enterprises using or intending to use, a DevOps approach in the next year, less than half of those already using DevOps repo... 4 years ago | 41 mins Load more