Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live Demo - Network Segmentation (Internal and External) Arien Seghetti, Solutions Architect In this Live Demo, we will address the following: - Discover unnecessary internal network channels between machines (LM) - Discover unnecessary extern... June 28, 2022 3:00pm Combating Ransomware 2.0: Beyond Backups Dr. Mike Lloyd, Chief Technology Officer and Bryan Barney, CEO, RedSeal Ransomware isn’t new – we can track it back to attacks using floppy disks in 1989 – and like all attacks, it has evolved over time. As defenders adopt... June 28, 2022 5:00pm Lapsus$: The Latest Threat To Your Digital Supply Chain Karl Sigler, Senior Security Research Manager, Trustwave SpiderLabs The threat against your digital supply chain is real. The cybercriminal gang Lapsus$ burst onto the scene with unique compromise and data exfiltratio... 1 week ago | 35 mins Mobile Malware Reverse Engineering Workshop Victor Chebyshev, Lead Security Researcher on the Kaspersky Global Research & Analysis Team (GReAT) Vicious attackers target both Android and iOS devices using specifically designed mobile malware. Consequently, it is imperative that reversers know h... 3 weeks ago | 123 mins Security as an Accelerator: 7 Fundamentals of a Secure Cloud Network Hammad Alam Principal Solution Architect and Shahzad Ali, VP, Customer Solutions Architect Every CISO or CIO has tasked their architects to secure the ever-growing cloud footprint. With so many different tools and options to choose from, the... 3 weeks ago | 18 mins Responding to Ransomware: How to Leverage Threat Intelligence and Threat Hunting Asaf Haski, Senior Cyber Threat Intelligence (CTI) Analyst, CyberProof & Karina Daniel, Cyber Threat Hunter, CyberProof How do the threat hunting team and the Cyber Threat Intelligence (CTI) team collaborate in real time during a ransomware attack? What are the key poin... 4 weeks ago | 55 mins SHUTTING DOWN DATA STAGING AND DATA EXFILTRATION ATTACKS Jamie Moles, Senior Technical Marketing Manager, ExtraHop | Bill Brenner, VP, Content Strategy, Cyber Risk Alliance Data Staging and Data Exfiltration are common activities used in today's ransomware playbooks. Data Staging is a combination of locating the data the ... 3 months ago | 48 mins 5 Overlooked Security Capabilities for Compliance in Public Cloud Jigar Shah, VP of Product and Erik Kristiansen, VP of Marketing, Valtix For many organizations, making the move to the cloud also means understanding how to achieve the same levels of visibility and control required of the... 2 months ago | 40 mins Ep 5 - Top 5 Pitfalls to Avoid in Client-Side Security Dor Zakai, Senior Director Solutions Engineering, F5 and Patrick Zoller, Security Solutions Architect, F5 As you secure your applications and protect them from security breaches and fraud events, you've likely turned to preventative and detective controls ... 2 months ago | 60 mins Ransomware Trends in 2022 Leena Bongale, Manager Data Security, TD Bank Let’s face it, cyberattacks such as ransomware are becoming more common and more complex. The coming 12 months will bring increasingly aggressive cybe... 2 months ago | 38 mins Load more