Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Illuminate the Blind Spots: Why your security investments are failing Dawid Kowalski - Senior Director Field Engineering, EMEA, FireMon We all know the story. The threat landscape is ever-evolving and security teams have to stay ahead of the curve and protect their networks. But what i... 12 hours ago | 48 mins Myth vs. Reality: Is NDR a missing link in your security strategy? Girard Ordway,Sol Arch Lead ExtraHop; Francis Johnson CISSP/Sr Mngr Capgemini; Kris Rosson, CISSP; Brandon Dunlap, Moderator Cyberattackers can exploit vulnerabilities and evade controls, but they can't hide from the network. Network detection and response (NDR) solutions gi... 8 hours ago | 60 mins APAC & Global outlook: Threat landscape and predictions Vitaly Kamluk, Director of APAC Research Center, Kaspersky; Ng Yeok Chong, Head of Pre-Sales, APAC This session will focus on covering the most updated cyber trends and threats focusing on APAC countries and globally. Join Vitaly Kamluk, Director, G... 20 hours ago | 72 mins Beyond the Endpoint – Tackling Your Biggest Cybersecurity Problems TJ Nelson, Director, Information Security Research, Secureworks; George Anderson, Sr. Product Marketing Manager, Secureworks An overreliance on endpoint detection and response (EDR) alone is bound to leave holes in your cyber defense. That’s because cybersecurity incidents n... April 4, 2023 1:00pm Beyond antivirus: Endpoint security strategies to combat sophisticated threats Elango Balusamy, Co-founder & CTO | SquareShift Technologies Endpoint security is critical to protecting your organization from cyber threats, but traditional antivirus solutions are no longer enough. Cyber crim... April 5, 2023 10:00am Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... March 23, 2023 4:00pm Containing and Recovering From Ransomware Attacks Valecia Stocchetti (CIS) | Adnan Baykal (CyberWA) | Daniel Cuthbert (Banco Santander) | Deborah (Debbi) Blyth (Crowdstrike) ‘Hosted by’ statement: This webinar series is graciously hosted by ActZero, who is a contributing member of the Blueprint for Ransomware Defense work... March 28, 2023 3:00pm Your Approach to Security Operations Must Evolve (Panel Discussion) Jon Oltsik, ESG Fellow | Joel Vincent, Cribl | Sean Donnelly, Simspace Your Approach to Security Operations Must Evolve Modern SOCs play an essential role in any organization, and this goes beyond cybersecurity -- it has... 3 weeks ago | 46 mins Making Sense of Cybersecurity Best Practices Chris Kubic, CISO What do CISA’s new strategy, the DoD’s Zero Trust strategy, the standing executive order, and NIST guidance have in common? If you said, “They all lay... 1 month ago | 59 mins Knock Knock – Do You Know Who Is There? You Should. Marshall Heilman, CTO, Mandiant Going Beyond the Basics Using Threat Intelligence to Secure Your Organization Like all things security, if it isn’t current, it isn’t useful. Threat ... 2 months ago | 39 mins Load more