Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Cyber Threat Landscape: Get Ready for 2023 Expert panel The social, economic and technological shifts of the past two years prompted cyber attackers to refine their methods, becoming more sophisticated and ... July 21, 2022 3:00pm Securing the Identity Perimeter with Defense in Depth Jack Poller, Senior Analyst, ESG The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are suscept... 2 weeks ago | 16 mins Securing Communications at the Tactical Edge using Hardware Security Modules Alex Antrim, Senior Solutions Engineer, Yubico Today’s warfighters and the network architects that design the communications networks that they rely on, are faced with adversaries that are increasi... 2 days ago | 61 mins A Tale of Two Beacons: Detecting Implants at the Host and Network Levels Giovanni Vigna Sr. Director Threat Intelligence VMware, Jared Myers Sr. Manager, TAU VMware Cobalt Strike, a tool that support red teams in attack simulation exercises, provides several techniques to execute attacks that compromise a target n... 3 months ago | 23 mins Protecting organization data against cyber attacks, threats and data breaches Glen D. Singh, Cybersecurity Author and Trainer Tune into this session to learn about the importance of identifying and protecting various types of assets within organizations and how using a multi-... 1 month ago | 45 mins A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist; Brandon Dunlap, Moderator Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dange... 3 months ago | 60 mins A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense Roger Grimes (KnowBe4), David Solis (Spiceworks) Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which today’s determined hackers can explo... 4 months ago | 58 mins Secure Browser or Browser Isolation 101 Evgeniy Kharam, VP, Cybersecurity Solution Architecture at Herjavec Group Browsing is now an inherent part of our work and personal lives, from researching, shopping, social media, and accessing SaaS applications. Unfortunat... 2 months ago | 38 mins A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense Roger Grimes, Data-Driven Defense Evangelist, KnowBe4 Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which today’s determined hackers can explo... 10 months ago | 59 mins Cyber Defense Challenge Made Possible By Target Jodie Kautt, Erin Becker, Kelsey Helms, and Kyle Eaton Are you ready to explore how threat actors think, leverage threat intelligence, and gain experience working within different roles of a cyber defense ... 3 months ago | 52 mins Load more