Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware Trends: The Evolution of Threat Mike McLellan, Director of Intelligence, Marcelle Lee, Senior Security Researcher, Keith Jarvis, Senior Security Researcher What you’ll learn: The seriousness of the ransomware threat The ransomware landscape post-Colonial Pipeline attack What you can do to defend against r... May 31, 2022 1:00pm Multi-Signal Defense Kill Chain: Strengthening Combat Capabilities in Intrusions Keegan Keplinger, Research and Reporting Lead, eSentire; Brandon Dunlap, Moderator Cybersecurity teams are fighting a losing battle trying to keep up with complex business requirements and the expanding attack surface. Although tradi... May 19, 2022 5:00pm Falcon Complete stops threats faster with managed identity threat protection Ryan Romagnolo Senior Intrusion Researcher, Falcon OverWatch & Craig Sohn Sr. Analyst, Falcon Complete Join CrowdStrike experts as they will unpack the current state of identity-based threats and how Falcon Complete managed detection and response is cha... 1 week ago | 36 mins 5 Overlooked Security Capabilities for Compliance in Public Cloud Jigar Shah, VP of Product and Erik Kristiansen, VP of Marketing, Valtix For many organizations, making the move to the cloud also means understanding how to achieve the same levels of visibility and control required of the... 6 days ago | 40 mins WebShell Intrusion Live Attack & Defend Demo Falcon Complete EMEA Analysts This webinar will be delivered by the CrowdStrike Falcon Complete team where they will respond live to an exploit leveraging a vulnerable public facin... 3 weeks ago | 55 mins SASE- A new way to think about security and networking Keith O'Brien (Palo Alto Networks), Yogesh Ranade (Palo Alto Networks), Beth Cohen (Verizon), David Grady (Verizon) Secure access service edge (SASE) seems to be on everybody's mind these days. And why not? With all of the new security threats and the potential for ... 3 weeks ago | 42 mins Reduce Tool Sprawl and Strengthen Security with New Traffic Analysis Tool Darshan Shah, Senior Marketing Manager at Gigamon Suffering from tool sprawl but still need to buy more to address security, performance or tool overload? Register for this webinar where Gigamon exp... 4 weeks ago | 47 mins Reinventing MDR With Identity Threat Protection Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... July 7, 2022 3:30am Resolving an Identity Crisis? Approaches, Impacts and Innovation for Fraud & KYC Ian Holmes, Keith Swanson In this discussion with Information Security Media Group, we discuss: How digital fraud has changed the operating environment globally and the comple... June 8, 2022 3:00am Setting yourself up for success - Logging and Monitoring Barnaby Skeggs, Principal Consultant, Mandiant • How did they gain access to our environment? • How long have we been compromised? • Did they steal any data? These same questions are asked of eve... June 9, 2022 5:00am Load more