Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... February 21, 2023 4:00pm NEW-LIVE Ransomware Crisis Simulation with You in Control Sharon Rosenman, CMO, Wayne Pruitt, Cyber Range Trainer, Ben Hockman Prod Dir, Cyberbit ; Brandon Dunlap, Moderator Ransomware readiness is the #1 board-level directive when it comes to cyber security with attacks becoming increasingly complex. Join Cyberbit and (... 9 hours ago | 62 mins SOARing to New Heights with DNS Taylor Wilkes-Pierce, Director of Solution Engineering; Brandon Dunlap, Moderator SOC and threat hunting teams find themselves in a rapidly evolving landscape where identifying adversary domain and infrastructure TTPs can be critica... February 9, 2023 1:00pm Deep Dive Analysis of Multi-Factor Authentication Request Generation Attacks Four-time Microsoft MVP Nick Cavalanci, LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with acces... February 16, 2023 5:00pm NEW-LIVE Ransomware Crisis Simulation with You in Control Sharon Rosenman, CMO Cyberbit; Tony Rowan, Lead Technical Architect, Sales EMEA, Cyberbit; Brandon Dunlap, Moderator Ransomware readiness is the #1 board-level directive when it comes to cyber security with attacks becoming increasingly complex. Join Cyberbit and (... February 23, 2023 1:00pm BlueVoyant #2- A Look Into The SOC: A Purple Team Exercise Travis Mercier,Head of Operations, BlueVoyant;Mike Scutt,Head of Advanced Threat Detection,BlueVoyant;B Dunlap,Moderator Purple teaming, or a method of working between Red attack teams and Blue defense teams, is a way to measure detection fidelity and offer test and rete... 3 months ago | 60 mins A Leader's Guide to Security Operations: Battle advanced threat actors Niall Browne (CISO, Palo Alto Networks), Allie Mellen (Senior Analyst, Forrester) In The 2021 State of Enterprise Breaches, Forrester found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover fr... February 16, 2023 3:30am Navigating SOC 2 Compliance as a Startup (with Octane and Tactic) Austin Hale (Tactic COO), Andrés Veléz (Octane COO), and Andrew Gulrajani (Partner Relationship Manager at Vanta) Want to hear about the SOC 2 certification process directly from startup leaders who just crossed the Type II finish line? Learn how Austin Hale and... 7 months ago | 49 mins Simplifying SOC 2 Compliance with AWS Part I - Featuring DuploCloud and A-LIGN Venkat Thiruvengadam - CEO DuploCloud In this video AWS expert partners DuploCloud and A-LIGN along with a member of AWS ATO on AWS team walk through how to achieve SOC 2 compliance. SOC 2... 8 months ago | 16 mins Simplifying SOC 2 Compliance with AWS Part II - Featuring DuploCloud and A-LIGN Venkat Thiruvengadam - CEO DuploCloud In this video AWS expert partners DuploCloud and A-LIGN along with a member of AWS ATO on AWS team walk through how to achieve SOC 2 compliance. SOC 2... 8 months ago | 21 mins Load more