Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 1 week ago | 21 mins Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... 1 day ago | 39 mins Entering the Cloud-Native Security Era LogRhythm Product Director, Matt Willems and Derek Watkins Security leaders need to routinely assess security risks and leverage best practices for mitigating risks. Software as a Service (SaaS) is a delivery ... 1 day ago | 66 mins Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... March 30, 2023 3:00am Securing Talent for SOC David Cho, Director of Professional Development at CyberVista and Jonathan Lanning, Senior Security Manager According to (ISC)2 Cybersecurity Workforce Study for 2020, the United States has a cyber workforce of approximately 879,000 people with an estimated ... 3 weeks ago | 53 mins EMEA Cyber Threat Intelligence Webinar – Season 2, Episode 5 Gurinder Bhatti, Johan Dreyer, Andrew Williams, Thom Bailey In this episode of the EMEA Threat Intelligence Webinar, Thom Bailey, Sr. Director, Strategy & Evangelism, was joined by Andrew Williams, Sr. Prod Mar... 1 month ago | 59 mins NEW-LIVE Ransomware Crisis Simulation with You in Control Sharon Rosenman,CMO, Tony Rowan, Lead Tech Architect & Ben Hockman, Prd Dir,Cyberbit; Catherine Chapman, Moderator Ransomware readiness is the #1 board-level directive when it comes to cyber security with attacks becoming increasingly complex. Join Cyberbit and (... 4 weeks ago | 70 mins Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... 1 month ago | 48 mins Deep Dive Analysis of Multi-Factor Authentication Request Generation Attacks Four-time Microsoft MVP Nick Cavalanci, LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with acces... 1 month ago | 74 mins NEW-LIVE Ransomware Crisis Simulation with You in Control Sharon Rosenman, CMO, Wayne Pruitt, Cyber Range Trainer, Ben Hockman Prod Dir, Cyberbit ; Brandon Dunlap, Moderator Ransomware readiness is the #1 board-level directive when it comes to cyber security with attacks becoming increasingly complex. Join Cyberbit and (... 2 months ago | 62 mins Load more