Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Adversary-generated Threat Intelligence: Cut Through the Data Fog Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack, and your SOC team is likely drowning in alerts. Something is broken—and that’s where advanced detection ... October 19, 2023 9:00am Evaluating Threat Detection and Response Solutions Natalie Timms, Security Operations Specialist TDR solutions are not new, in fact these days it’s hard to find a security vendor that doesn’t offer a solution, or is at least a technology partner w... 3 weeks ago | 55 mins Mastering Automated Cloud Security Incident Response: Strategies and Tools Elango Balusamy, Co-founder & CTO | SquareShift Technologies In the rapidly evolving landscape of cloud computing, security incidents are a constant threat. To effectively protect your cloud infrastructure and d... October 26, 2023 10:00am Defend Your Frontiers with Collaborative Cybersecurity Defenses Jen Easterly, Director of the CISA; Wendy Thomas, CEO, Secureworks Join Jen Easterly, Director of CISA, and Wendy Thomas, Secureworks CEO, in a thought-provoking fireside chat as they share the rising imperative for c... November 2, 2023 1:00pm Is Your IR Ready for Cloud? Lessons From the Front Lines of Nation-State Attacks Karl Ots, Head of Cloud Security | EPAM ; Aviv Srour, Head of Cyber Innovation | EPAM The need for structured IR readiness process that addresses both on-premises and cloud environments is clearer than ever before. In this session, an i... October 25, 2023 12:00pm Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... 5 months ago | 49 mins EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More Richard Barrell EDR… the cybersecurity solution that is a vast improvement over mere endpoint protection and anti-virus solutions….Right? Well, there is one small hit... 2 months ago | 42 mins Reducing SecOps Complexity with SIEM Replacement Greg Kushmerek - Principal Architect, Google Security Operations Legacy security information and event management (SIEM) tools were built in the pre-cloud era. They often lack the speed and scale required for modern... 1 day ago | 23 mins [CTO Webinarシリーズ] 攻撃者にスキを与えない!全方位の対策をシンプルに実現していくためには? ラピッドセブン・ジャパン株式会社 最高技術責任者/CTO 古川勝也 クラウド化の促進や働き方の多様化は、攻撃者が付け入る隙(攻撃可能領域/Attack Surface) の拡張要因ともなっています。 また、巧妙化する一方の攻撃者の、新たな攻撃手法に備えるために、新たなセキュリティツールを導入したり、組織改革を行なっている企業や組織も多いでしょう。 複雑化する一方の... 12 hours ago | 45 mins Improving Security by Reducing Complexity Rick Howard, The CyberWire; Willy Leichter, Cyware Our incremental approach to cybersecurity has resulted in far too many point solutions that don’t play well together and are too difficult to manage. ... 1 day ago | 52 mins Load more