Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 1 day ago | 39 mins Transforming cyber incident recovery with Veeam and Kyndryl Christophe Bertrand, Enterprise Strategy Group; John Greenough, Kyndryl; Jeff Reichard, Veeam Cyber Resilience should be top of mind for every business in this digital age. No matter the genesis of an incident, the ability to recover rapidly fr... 6 days ago | 37 mins Threat Intelligence in Action Lee Rendell - Senior Presales Manager at Kaspersky UK Access to independent, current, globally sourced cyber threat intelligence at no charge. We anticipate that the current conflict will lead to a grow... 2 weeks ago | 49 mins Is Your IR Ready for Cloud? Lessons From the Front Lines of Nation-State Attacks Karl Ots, Head of Cloud Security | EPAM ; Aviv Srour, Head of Cyber Innovation | EPAM The need for structured IR readiness process that addresses both on-premises and cloud environments is clearer than ever before. In this session, an i... October 25, 2023 12:00pm Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1 Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a bes... 1 month ago | 53 mins Adversary-generated Threat Intelligence: Cut Through the Data Fog Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack, and your SOC team is likely drowning in alerts. Something is broken—and that’s where advanced detection ... October 19, 2023 9:00am Defend Your Frontiers with Collaborative Cybersecurity Defenses Jen Easterly, Director of the CISA; Wendy Thomas, CEO, Secureworks Join Jen Easterly, Director of CISA, and Wendy Thomas, Secureworks CEO, in a thought-provoking fireside chat as they share the rising imperative for c... November 2, 2023 1:00pm Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... 1 month ago | 48 mins Live now Mitigating DDOS in the Fediverse with Mastodon Renaud Chaput, DevOps Consultant, Mastodon, Brix Gomez Senior CSOC Analyst, Fastly Federated social media networks are quickly becoming a popular alternative to mainstream social media platforms. Collectives like the Fediverse are he... September 27, 2023 7:00pm | 32 mins Urgency vs Priority in Vulnerability Management Mike DeNapoli, Director, Cybersecurity Architect at Cymulate With hundreds of thousands of potential vulnerabilities to be dealt with at any time, how can organizations define which should be addressed first? T... 4 hours ago | 61 mins Load more