Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... August 10, 2022 12:00pm The Future of MDR: Reimagining the ‘R’ with Unlimited DFIR [EMEA] Warwick Webb, Senior Director, Detection & Response Services; Robert Knapp, Manager of Incident Response Services at Rapid7 The term “Incident Response” can mean different things to different Managed Detection and Response (MDR) providers. The big question: who is ultimatel... August 11, 2022 10:00am Insider Threats Are On the Rise: Insights from The Ponemon Report 2022 Yvette Lejins, Resident CISO, Proofpoint APJ & Steve Moros, Snr Director Threat Detection & Advanced Threats, Proofpoint APJ Insider threats continue to be a significant — yet frequently overlooked — cybersecurity threat within organisations. In fact, in the past two years, ... August 16, 2022 9:00am Cyber Threat Insights For The Financial Sector [EMEA] Derek Buchanan, Threat Advisor for EMEA (CrowdStrike) The financial sector – from banks to insurance – is a beloved victim for cyber criminals looking for a quick payday. The lack of security consistency ... 1 week ago | 47 mins WebShell Intrusion Live Attack & Defend Demo [EMEA] Falcon Complete EMEA Analysts This webinar will be delivered by the CrowdStrike Falcon Complete team where they will respond live to an exploit leveraging a vulnerable public facin... 17 hours ago | 55 mins Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 17 hours ago | 49 mins Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 2 weeks ago | 62 mins A People-Centric Security Model for Financial Services John Checco, Proofpoint Resident CISO, Sean O'Dowd, Proofpoint Director of Financial Services Solutions For financial services firms, many cyber incidents and fraud is the result of errors, oversights, or deliberate mischief of individual employees. Whet... 1 week ago | 31 mins Live Attack Simulation Juliana Wong, Account Director, Asia, Cybereason; EngHao Tan, CISSP, Senior Sales Engineer, APAC, Cybereason Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to s... August 10, 2022 3:00am Threat Landscape 2022: How to Future Proof Your Cybersecurity Strategy Mary Ann Blair, Chief Information Security Officer and Ed Hudson, Chief Information Security Officer This is a challenging time to be an IT security professional in education: Remote work and learning are expanding and blurring the borders of traditio... August 10, 2022 4:00am Load more