Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware groups negotiation tactics: what you need to know Marc Rivero, senior security researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 4 days ago | 39 mins How Zero Trust Accelerates Incident Response TK Keanini, Cisco Secure CTO, and Brad Garnett, Director of Talos Incident Response Zero trust adoption is on the rise, and while some view it as solely about securing remote user access, others recognize how zero trust builds securit... 3 weeks ago | 30 mins Is Your IR Ready for Cloud? Lessons From the Front Lines of Nation-State Attacks Karl Ots, Head of Cloud Security | EPAM ; Aviv Srour, Head of Cyber Innovation | EPAM The need for structured IR readiness process that addresses both on-premises and cloud environments is clearer than ever before. In this session, an i... October 25, 2023 12:00pm Adversary-generated Threat Intelligence: Cut Through the Data Fog Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack, and your SOC team is likely drowning in alerts. Something is broken—and that’s where advanced detection ... October 19, 2023 9:00am Evaluating Threat Detection and Response Solutions Natalie Timms, Security Operations Specialist TDR solutions are not new, in fact these days it’s hard to find a security vendor that doesn’t offer a solution, or is at least a technology partner w... 4 weeks ago | 55 mins 8 Common Insider Threat Indicators & How to Defend Against Bad Actors Shunta Sharod Sanders What do the latest credential-stealing phishing exploits, theft of trade secrets, and ransomware attacks from Hive, BlackByte, LAPSU$$, and Lockbit3.0... 1 month ago | 21 mins Defend Your Frontiers with Collaborative Cybersecurity Defenses Jen Easterly, Director of the CISA; Wendy Thomas, CEO, Secureworks Join Jen Easterly, Director of CISA, and Wendy Thomas, Secureworks CEO, in a thought-provoking fireside chat as they share the rising imperative for c... November 2, 2023 1:00pm Threat Intelligence in Action Lee Rendell - Senior Presales Manager at Kaspersky UK Access to independent, current, globally sourced cyber threat intelligence at no charge. We anticipate that the current conflict will lead to a grow... 3 weeks ago | 49 mins Cyber Insurance—How to Meet Security Requirements Tony Anscombe, Chief Security Evangelist & Jorge Andino Jr., Sales Engineer In today’s evolving threat landscape, many companies are looking to procure a cyber insurance policy to mitigate their damages in the event of a cyber... 2 days ago | 57 mins A Proactive Approach to Incident Response for OT Paul Shaver, Global Practice Leader, Mandiant With a marked increase RaaS, APT, and nation-state sponsored attacks in the industrial cybersecurity sector over the last 18 months it is more critica... 1 day ago | 20 mins Load more