Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Levers of Human Deception: The Science and Methodology Behind Social Engineering Jacqueline Jayne (KnowBe4), Rachel DeAmbrose (TechTalk) No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different leve... 1 week ago | 56 mins A Guide To Active XDR: Shift To Proactive Cybersecurity Dave Gruber, Senior Cybersecurity Analyst, ESG | Craig Harber, CTO, Fidelis Cybersecurity Identifying and neutralizing threats early on is key to staying ahead of a sophisticated and evolving attack surface. As detection and response strate... 3 weeks ago | 51 mins Cyber Deception with MITRE Engage for Zero trust networks Bill Hill, CISO at Mitre and Sahir Hidayatullah, Vice President of Active Defense at Zscaler Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 2 months ago | 63 mins Cyber deception with MITRE Engage for zero trust networks - ASEAN Sahir Hidayatullah, VP Active Defense, Zscaler & Dr. Stanley Barr, Sr. Principal Cybersec Researcher & Bill Hill, CISO, Mitre Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 3 months ago | 63 mins Levers of Human Deception: The Science and Methodology Behind Social Engineering Erich Kron (KnowBe4) No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different leve... 2 months ago | 56 mins How to Stay Ahead of Threats With Deception Technology Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive A Guide to Operational Security in 2021: Episode 7 Deception technology deceives attackers by distributing traps and decoys across your system infras... 4 months ago | 42 mins Levers of Human Deception: The Science & Methodology Behind Social Engineering Erich Kron, Security Awareness Advocate for KnowBe4; Brandon Dunlap, Moderator No matter how much security technology we purchase, we still face a fundamental security problem: people. This (ISC)² and KnowBe4 webinar will explore... 2 months ago | 59 mins Findings From 2022 Cyberthreat Defense Report Steve Piper, Founder and CEO of CyberEdge Group, and Carolyn Crandall, Chief Security Advocate, Attivo Networks Attivo Networks is proud to sponsor CyberEdge’s 2022 Cyberthreat Defense Report. Now in its ninth year, this report provides a comprehensive review of... 1 week ago | 60 mins Threat Deception: Tricking Attackers for Fun and Defense Austin McBride, Data Scientist, Cisco Umbrella and Dr. Stanley Barr, Senior Principle Scientist, MITRE Hear from experts on the latest tools and tactics in threat deception; Learn about the benefits of tricking attackers as part of overall defense; Get ... 3 months ago | 60 mins [APAC] How to Stay Ahead of Threats With Deception Technology Tod Beardsley, Rapid7 | Chris Dodt, Freedom Financial Network | Jorge Orchilles, SCYTHE | Bryan Seely, Cyemptive Deception technology deceives attackers by distributing traps and decoys across your system infrastructure. As breaches and attacks become more sophis... 6 months ago | 42 mins Load more