Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live Attack Simulation Juliana Wong, Account Director, Asia, Cybereason; EngHao Tan, CISSP, Senior Sales Engineer, APAC, Cybereason Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to s... 1 week ago | 64 mins Combat Ransomware with Modern Data Protection Raymond Goh, Senior Director, Systems Engineering, Asia and Japan, Veeam Software Gain insights on safeguarding your business-critical data in the event of a successful infiltration with minimal cost and resources. September 7, 2022 5:00am Attack Surface Management: Staying Ahead of the Hackers Mike Kelly, CEO of ProcessBolt; Gaurav Gaur, CTO of ProcessBolt; Alex Crittenden, VP of White Oak Security During the pandemic, the use of employee laptops without adequate protection grew at an alarming rate, faster than security teams could manage. Everyt... 3 months ago | 28 mins The invisible player on every security team, regardless of budget or skills Dave Klein, Cybersecurity Evangelist Director Extended Security Posture Management is a comprehensive approach to security validation and optimization. It maps security gaps, the attack surface, a... 3 months ago | 33 mins Ransomware Hostage Rescue Checklist: Preventing & Surviving a Ransomware Attack Roger Grimes (KnowBe4) Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it ... 4 months ago | 61 mins Live Attack Simulation Angeline Tan, Account Director, APAC, Cybereason; EngHao Tan, CISSP, Senior Sales Engineer, APAC, Cybereason Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to s... 8 months ago | 71 mins Attack Simulation: Hunter Series Israel Barak, CISO, JJ Cranford, Senior Product Marketing Manager, and Tim Amey, Field CTO Join Cybereason's CISO, Israel Barak, Senior Product Marketing Manager JJ Cranford, and Field CTO Tim Amey for an inside look at how multi-stage attac... 7 months ago | 84 mins Breaking the Chain: Hindering the Ransomware Killchain Todd Carroll, CISO & VP Operations at CybelAngel Ransomware is a clear and present danger to companies and global supply chains. With ransomware attacks crippling gasoline, food, and healthcare in th... 10 months ago | 15 mins Attack Simulation: Hunter Series Israel Barak, CISO, JJ Cranford, Senior Product Marketing Manager, and Tim Amey, Field CTO "Join Cybereason's CISO, Israel Barak, Senior Product Marketing Manager JJ Cranford, and Field CTO Tim Amey for an inside look at how multi-stage atta... 6 months ago | 84 mins Comment briser la chaîne du Ransomware ? Pauline Apretna, Country Lead France chez CybelAngel, & Mauro Israel, Senior Technical Sales Engineer chez Security Scorecard Ce n'est plus un secret, les activités des entreprises ont massivement migré vers le digital. Cette transformation a facilité la "Killchain" du Ransom... 11 months ago | 50 mins Load more