Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 6 months ago | 24 mins Security Automation and The Evolution of SOAR with IDC Chris Kissel, IDC Security Products Research VP; and Cody Cornell, Swimlane Co-Founder and Chief Strategy Officer While first generation SOAR (Security Orchestration, Automation and Response) platforms promised the moon, they often failed to deliver for a variety ... March 28, 2023 4:00pm Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... March 28, 2023 9:00am Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... March 30, 2023 6:00am The ROI of Low-Code Security Automation Ed Amoroso, TAG Cyber & Cody Cornell, Swimlane As the world’s leading security-forward organizations increasingly turn to low-code security automation, a new independent study from TAG Cyber reveal... 4 days ago | 54 mins Fortifying Your Security Operations with Modern SOAR Jay Spann, SOAR Evangelist Legacy SOAR (Security Orchestration, Automation and Response) technology promised to revolutionize the practice of security operations. Unfortunately... 4 weeks ago | 33 mins The MITRE ATT&CK Framework and SOAR: Better Together Jon Oltsik, Enterprise Strategy Group and Karl Klaessig, ServiceNow Enterprises are enthusiastic about the MITRE ATT&CK Framework, a behavioral-based threat model, and how it can help enable thinking “like the enemy”—s... April 11, 2023 4:00pm Take the Leap and SOAR with DNS Taylor Wilkes-Pierce, Global Director of Solutions Engineering, DomainTools Threat hunting and SOC teams find themselves in an ever-changing landscape where identifying infrastructure TTPs and adversary domains can be critical... 3 weeks ago | 60 mins Building an Intelligence-Driven SOC Mark Bermingham, Willy Leichter Timely threat intelligence can be critical to proactively stop attacks before damage is done. But in many security teams, threat intel is handled by a... April 6, 2023 5:00pm Automating Intelligent Actions Based on Threat Intel Mark Bermingham, Mark Carosella This Lunch-and-Learn series highlights Cyware’s end-to-end approach to Threat Intel Management, automating ingestion, processing, dissemination, and o... 1 week ago | 31 mins Load more