Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 2 weeks ago | 21 mins Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... May 4, 2023 2:00pm Protecting Against Zero-Day Threats and Sophisticated Attack Tactics Baksheesh Singh Ghuman, Director of Product Marketing, Fortinet, and Sigalit Kaidar, Director of Product Marketing, Fortinet Learn why inline sandbox and deception tools are must-haves. Every organization’s attack surface is constantly expanding, and threat actors are taking... April 18, 2023 4:00pm Beauty Is in the Eye of the Deceiver Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin Deception Technology for Your Zero-Trust Arsenal Traditional security measures are no longer enough to keep up with the increase in sophisticated cyb... 2 weeks ago | 35 mins Countering Cyber Deception to Mitigate Risk Dr. Francis Gaffney Emails are not limited to the virtual. For attack campaigns via collaborative platforms and email to be successful there usually needs to be the inter... 2 months ago | 31 mins What does Social Engineering Look Like? Dawn McCarty | Senior Security Engineer & Cyberologist (Optum) In this webinar with WiCyS strategic partner, Optum, you will learn examples of what social engineering looks like in the real world; helping even non... 4 weeks ago | 39 mins Struggling to Detect Threats in the Cloud? Rami Mizrahi, VP of Software Engineering, Deception Deception technology is one of the most important tools in the SOC arsenal, but many people are under the impression that deception in the cloud is ju... 6 months ago | 56 mins How to Hunt Cyber Threats with Deception Dan Brett, CSO CounterCraft, and Nahim Fazal Threat hunting is still a relatively new concept in the world of cyber security, but already, there are a number of different approaches emerging on h... 4 months ago | 57 mins Technical Evidence of Attacks on Ukrainian Government Infrastructure Nicole Carignan, CounterCraft, Customer Success Manager, and David Barroso, CounterCraft, CEO An attack involving threat actors attempting to attack Ukrainian government infrastructure happened in one of our deception environments. These actors... 5 months ago | 27 mins Cyber deception with MITRE Engage for zero trust networks - ASEAN Sahir Hidayatullah, VP Active Defense, Zscaler & Dr. Stanley Barr, Sr. Principal Cybersec Researcher & Bill Hill, CISO, Mitre Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 12 months ago | 63 mins Load more