Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Mapping Attack Patterns to Detect Threats Mark Alba, Chief Product Officer, Anomali To move forward, we often reflect on the past. It’s no different in cybersecurity. Take, for instance, threat detection. In the early days of the in... 11 hours ago | 24 mins A CISO Perspective: From Threat Landscape Insights to Transformation Programs Chip Stewart, former CISO at the State of Maryland | Rajiv Raghunarayan, SVP Product Marketing, Anomali An Informative Fireside Chat Chip Stewart, former Chief Information Security Officer at the State of Maryland, discusses with Anomali’s Rajiv Raghuna... 1 day ago | 41 mins How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 1 week ago | 48 mins Attack Flow: Laying the Foundation for Predictive Intelligence Jon Baker, Co-Founder and Director at MITRE Engenuity Center for Threat-Informed Defense Identify and Block Threats, Including Those that Haven’t Been Detected Yet As a community, we can realize the dream of predictive intel. Learning fro... June 15, 2023 3:00pm Deconstructing and analyzing Tabby and Notepad ++ Software Packages Tim Stahl, Director of Field Threat Engineering, ReversingLabs The tools we use every day, especially common open source tools, tend to be an overlooked link in the software supply chain. Performing third party ri... 1 week ago | 26 mins Are SIEM Solutions enough? Ryan Alban, Senior Manager of Global Solution Leads - George Anderson, Senior Manager of Product Marketing Choose the right SecOps platform to spend and defend effectively. What You’ll Learn: • The differences between SIEM and XDR and how they both impact... 2 weeks ago | 64 mins Attack Flow Panel Discussion and Demo Jon Baker, MITRE Engenuity Center for Threat-Informed Defense | Mark Alba, Cindy Goodwin-Sak, & Rajiv Raghunarayan, Anomali An Informative Session with Experts from Anomali and MITRE Engenuity Center for Threat-Informed Defense This on-demand webinar begins with a Q&A disc... June 29, 2023 3:00pm Get a Grip! The Role, State, and Progress of CTI for Organizations Steve Benton, VP of Anomali Threat Research, Anomali, and Jon Oltsik, Distinguished Analyst & ESG Fellow, ESG An Informative Discussion with ESG and Anomali In this webinar, Steve Benton, VP of Anomali Threat Research at Anomali, and Jon Oltsik, Distinguished... 4 weeks ago | 58 mins The Future of XDR in Cybersecurity Chris Wilder, Research Director and Senior Analyst at TAG Cyber An Integrated Defense Against Advanced Threats As cyber threats continue to evolve and become more sophisticated, organizations are struggling to kee... 2 weeks ago | 37 mins Taking a Threat-Centric Approach with Big Data Tristan Morgan, Managing Director at BT Security | Steve Benton, VP of Anomali Threat Research at Anomali An Illuminating Fireside Chat with BT Security and Anomali Organizations and consumers are under constant attack from an increasingly sophisticated r... July 20, 2023 3:00pm Load more