Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of MDR: Reimagining the ‘R’ with Unlimited DFIR [EMEA] Warwick Webb, Senior Director, Detection & Response Services; Robert Knapp, Manager of Incident Response Services at Rapid7 The term “Incident Response” can mean different things to different Managed Detection and Response (MDR) providers. The big question: who is ultimatel... 1 week ago | 59 mins CISO Guide to Future-Proofing Your SOC [EMEA] Jeffrey Gardner, Practice Advisor Detection and Response, Rapid7 Given the current cyber threat landscape, your in-scope attack surface extends way beyond your organizational perimeter to cloud services, IoT devices... 2 weeks ago | 7 mins How to Protect Your Digital Business Rafe Pilling, Senior Security Researcher, Counter Threat Unit; Emma Jones, Proactive Incident Response Consultant How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital trans... 3 weeks ago | 64 mins Top 7 Tips to Transform Vulnerability Management Pierre-David Oriol, Director of Product Management - Eric Boivin, Solution Lead - Michael Weinstein, Director of Marketing Modern approaches to vulnerability management are reducing the need for manual intervention and increasing risk protection. What should you know to au... October 19, 2022 2:00pm Combating the Rise in Threats to Cloud Environments [EMEA] David Puzas, Scott Fanning, Joshua Shapiro (CrowdStrike) As organizations migrate more services and applications to the cloud, adversaries have shifted their focus to exploit a broader attack surface. From ... September 6, 2022 9:00am The Endpoint Security Alphabet Stew Must Include VM and PM Charles Kolodgy, Adjunct Professor, Rivier University | Principal, Security Mindsets Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of s... 1 month ago | 37 mins Become Cyber Resilient by Modernizing your SOC Dimitri McKay | Principal Security Specialist, Splunk Scott Dally | Director Security Operations Center, NTT Today, cybercriminals are consistently becoming more dangerous and more agile with their approach by using machine learning to exploit vulnerabilities... October 18, 2022 12:00pm Log4j and Beyond: How to Survive Open Source Zero-Days Shandra Gemmiti, Synopsys and Mike McGuire, Synopsys Whether you’re fighting a fire or mitigating a zero-day open source vulnerability, the response is important but it’s not the only factor. How you pre... 4 months ago | 37 mins Threats in 3 Minutes - Emotet, the World's Most Dangerous Malware (Explained) Shehnaaz, Product Expert Originally developed as a banking trojan in 2014, Emotet malware was once described as the world's most dangerous malware. What makes this malware so ... 10 hours ago | 5 mins Vulnerability & Compliance Management with Tanium Sam Rajachudamani, Senior Director, Portfolio Strategy, Tanium Join this webinar hosted by Tanium to learn how you can quickly identify, remediate, and validate remediation of vulnerabilities and configuration com... 1 day ago | 32 mins Load more