Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live Demo - Attack Based Vulnerability Prioritization Arien Seghetti, Solutions Architect A record number of nearly 20,000 vulnerabilities were disclosed in 2020, of which 57% were classified as critical or high severity, yet patching remai... July 12, 2022 3:00pm 2022 Cymulate Data Breaches Study - Methods, Implications, and Prevention Dave Klein, Cybersecurity Evangelist Director In this annual report, Cymulate surveyed over 800 enterprises looking at root causes, impacts, outcomes of cyber breaches as well as assessing key mit... 1 week ago | 39 mins Mandiant Incident Response in EMEA: Anatomy of a Ransomware Breach Mitchell Clarke, Consulting Manager, Incident Response Services, Mandiant Ransomware Series - Part Two Mandiant responds to hundreds of ransomware intrusions each year across the globe. In this session, our EMEA incident re... July 12, 2022 9:00am Validating Cyber Readiness with the ThreatSpace Cyber Range Experience Chris Michaels (SimSpace) and Nadean Tanner (Mandiant) Join Mandiant and SimSpace as they showcase the Mandiant ThreatSpace Cyber Range Experience – a joint offering that combines Mandiant’s industry-leadi... 1 week ago | 47 mins 2022 Cymulate Data Breaches Study - Methods, Implications, and Prevention Dave Klein, Cybersecurity Evangelist Director In this annual report, Cymulate surveyed over 800 enterprises looking at root causes, impacts, outcomes of cyber breaches as well as assessing key mit... 3 weeks ago | 39 mins How to Prevent Production Shutdown with a Proactive Approach to Cybersecurity Dave Klein, Cybersecurity Evangelist Director and Avigayil Stein, Product Marketing Manager Cyberattacks on the manufacturing industry have seen an increase in the past few years. As more companies are undergoing digital transformation and in... 1 week ago | 35 mins Finding Beacons In The Dark - A Guide To Stopping Cobalt Strike Attacks Jonathan Jackson - Director Sales Engineering APJ Cobalt Strike (CS) is the most widely used advanced adversary simulation and threat emulation software. It's very powerful, for both good and bad acto... July 19, 2022 3:00am Achieving Operational Competency through Security Validation Mandiant Security Validation Experts In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security v... 3 weeks ago | 39 mins Preparing for a Cyber Crisis: The ISF approach Daniel Norman, Senior Solutions Analyst at the ISF High-impact cyber attacks frequently make news headlines for all the wrong reasons and can cause significant financial, operational and reputational d... July 19, 2022 12:00pm Live Demo - Lateral Movement: Breaking Down & Identifying Terry Jenvey, Director of Sales Engineering EMEA In this Live Demo will be breaking down the subject of lateral movement and help identify what it looks like for the organization. Lateral movement i... July 26, 2022 3:00pm Load more