Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reinventing MDR With Identity Threat Protection (EMEA) Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... 3 days ago | 36 mins MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano Senior SE, Antonio Forzieri Cybersecurity Specialist & Matthias Maier EMEA Director of Product Marketing Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... July 7, 2022 12:00pm The Big SaaS Disconnect Christophe Bertrand, ESG and Drew Russell, Rubrik Microsoft 365 has become a Tier 1 application, mission critical to business operations – and targeted by ransomware attackers. While Microsoft provide... July 5, 2022 1:00am Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... July 5, 2022 9:00am The Big SaaS Disconnect Christophe Bertrand, ESG and Drew Russell, Rubrik Microsoft 365 has become a Tier 1 application, mission critical to business operations – and targeted by ransomware attackers. While Microsoft provide... July 5, 2022 10:00am The Cyber Threat Landscape: Get Ready for 2023 Panelists To Be Confirmed The social, economic and technological shifts of the past two years prompted cyber attackers to refine their methods, becoming more sophisticated and ... July 21, 2022 3:00pm 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Server Side Request Forger - Ep10 John Wagnon, Solutions Architect, F5 SSRF flaws occur when a web app fetches a remote resource without validating the user-supplied URL. Attackers can coerce the app to send a request to ... August 4, 2022 9:00am Steal the Attackers Playbook with Purple Teams Ed Adams, Security Innovation | Trupti Shiralkar, Illumio | Bill Titus, Skillsoft | Bryson Bort, SCYTHE Historical approaches to IT security have been driven by primary colors – red teams attack, blue teams defend. This leaves technical teams color blin... 3 days ago | 49 mins Fraud in 2022: Outsmarting Fraudsters in the Age of Intelligent Bots Patrice Boffa, Chief Customer Officer - Arkose Labs : Julianne Rose, Senior Product Marketing Manager - Arkose Labs As fraud and security teams raced to level up their account security in 2021, fraudsters were busy elevating their own strategy with advancements in b... June 27, 2022 5:00pm Load more