Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Deception with MITRE Engage for Zero trust networks Bill Hill, CISO at Mitre and Sahir Hidayatullah, Vice President of Active Defense at Zscaler Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 3 weeks ago | 63 mins Levers of Human Deception: The Science and Methodology Behind Social Engineering Erich Kron (KnowBe4) No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different leve... 2 weeks ago | 56 mins Levers of Human Deception: The Science & Methodology Behind Social Engineering Erich Kron, Security Awareness Advocate for KnowBe4; Brandon Dunlap, Moderator No matter how much security technology we purchase, we still face a fundamental security problem: people. This (ISC)² and KnowBe4 webinar will explore... 3 weeks ago | 59 mins Cyber deception with MITRE Engage for zero trust networks - ASEAN Sahir Hidayatullah, VP Active Defense, Zscaler & Dr. Stanley Barr, Sr. Principal Cybersec Researcher & Bill Hill, CISO, Mitre Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 1 month ago | 63 mins A Guide To Active XDR: Shift To Proactive Cybersecurity Dave Gruber, Senior Cybersecurity Analyst, ESG | Craig Harber, CTO, Fidelis Cybersecurity Identifying and neutralizing threats early on is key to staying ahead of a sophisticated and evolving attack surface. As detection and response strate... June 15, 2022 3:00pm Bootcamp Series Part 1: Disrupting the Attacker’s Toolkit - Before the Attack Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE Attackers are increasingly exploiting enterprise identities, allowing them to evade defenses, elevate privileges, acquire targets, and compromise them... 2 months ago | 29 mins Bootcamp Series Part 2: Disrupting the Attacker’s Toolkit - During the Attack Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE Attackers are increasingly targeting enterprise identities to impersonate users, allowing them to evade defenses, elevate privileges, acquire targets,... 2 months ago | 31 mins Threat Deception: Tricking Attackers for Fun and Defense Austin McBride, Data Scientist, Cisco Umbrella and Dr. Stanley Barr, Senior Principle Scientist, MITRE Hear from experts on the latest tools and tactics in threat deception; Learn about the benefits of tricking attackers as part of overall defense; Get ... 2 months ago | 60 mins How to Stay Ahead of Threats With Deception Technology Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive A Guide to Operational Security in 2021: Episode 7 Deception technology deceives attackers by distributing traps and decoys across your system infras... 3 months ago | 42 mins Threat Deception: Tricking Attackers for Fun and Defense Austin McBride, Data Scientist, Cisco Umbrella and Dr. Stanley Barr, Senior Principle Scientist, MITRE Hear from experts on the latest tools and tactics in threat deception; Learn about the benefits of tricking attackers as part of overall defense; Get ... 3 months ago | 60 mins Load more