Hi [[ session.user.profile.firstName ]]

CISOs Panel Discussion: Securing remote collaboration during a pandemic

Join BitDam’s CEO & Co-Founder, Liron Barak, as she hosts CISOs for discussion on the hottest cybersecurity topics nowadays including:

- WFH and the implications on organizations’ information security
- Protecting from ransomware and phishing across all collaboration platforms
- How to deal with the inevitable malware detection gap

Panelists:

Michael Sherwood, City of Las Vegas
Norman McKeown, LSH Auto UK Limited
Daniel Baird, Grahams the Family Dairy Ltd
Recorded Aug 13 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy
Presentation preview: CISOs Panel Discussion: Securing remote collaboration during a pandemic
  • Channel
  • Channel profile
  • Get into the Phisher's Mind: Cashing Out - Episode 4 Nov 10 2020 2:00 pm UTC 30 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover the phisher’s reward:

    Using the stolen assets
    What makes phishing attacks so popular and lucrative
    Why phishing attacks are still successful
    How to avoid being tricked and what to look out for
  • Get into the Phisher's Mind: The Mind Game - How to Penetrate your Target - Ep 3 Nov 3 2020 2:00 pm UTC 30 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover:

    How phishers design their attack
    Selecting the most suitable host
    Looks is everything - choosing the right attack look
    Distributing the attack: spraying vs. cherry picking
    The newest evasion techniques
  • Get into the Phisher's Mind: The Hunt - Attacker Victim Relationship - Episode 2 Recorded: Oct 27 2020 15 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.

    In this episode we will cover the main decisions taken by phishers:

    Picking the prey: business, government or individuals
    Selecting the brand to go after
    Which companies are more vulnerable to phishers
    The luring mechanism and attack packaging
  • Get into the Phisher's Mind: The Phishing Landscape - Episode 1 Recorded: Oct 21 2020 13 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To beat your enemies, you must know how they work. In this series of video talks, BitDam’s Cyber Expert, Roy Rashti, will share some of the phisher’s secrets. Getting into the phisher’s mind, episode #1 will cover:

    · What’s phishing and how it all started
    · Who is the phisher and what motivates them?
    · How phishers select their prey
    · Phisher’s interruptions and how to overcome them

    Join us to get a perspective of how phishers plan their scams, how they operate and how you can protect from it.
  • CISOs Panel Discussion: Securing remote collaboration during a pandemic Recorded: Aug 13 2020 35 mins
    Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy
    Join BitDam’s CEO & Co-Founder, Liron Barak, as she hosts CISOs for discussion on the hottest cybersecurity topics nowadays including:

    - WFH and the implications on organizations’ information security
    - Protecting from ransomware and phishing across all collaboration platforms
    - How to deal with the inevitable malware detection gap

    Panelists:

    Michael Sherwood, City of Las Vegas
    Norman McKeown, LSH Auto UK Limited
    Daniel Baird, Grahams the Family Dairy Ltd
  • How to Assess Your Email Vulnerability for Free in 20 Minutes? Recorded: Jul 22 2020 16 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?

    Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:

    - Introduction to 2 free non-intrusive Breach & Attack Simulation tools
    - How to use these tools safely
    - Live demos including installation and usage
    - How to read a Breach & Attack Simulation report

    Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
  • The Hacker’s Mind: Episode #4 - How to Stop the Cyber Cat & Mouse Game Recorded: Jul 9 2020 11 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #3 - The Payload and Execution Recorded: Jul 2 2020 14 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #2 - How Hackers Deliver Attacks to Your Computer Recorded: Jun 25 2020 12 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #1 - How Hackers Plan Their Attacks Recorded: Jun 18 2020 17 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)


    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
  • How to Assess Your Email Vulnerability for Free in 20 Minutes? Recorded: Jun 2 2020 17 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?

    Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:

    - Introduction to 2 free non-intrusive Breach & Attack Simulation tools
    - How to use these tools safely
    - Live demos including installation and usage
    - How to read a Breach & Attack Simulation report

    Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
  • Email Security: How to Protect from the Unknown with Simon Crosby Recorded: May 27 2020 35 mins
    Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
    BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.

    Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?

    Join us in this one-time discussion to better understand:

    - What makes rapidly evolving unknown threats our No. 1 enemy
    - The gaps of data-driven email security
    - Why model-driven security is the only way to deal with these threats
    - How to scale it while keeping end-user’s productivity
    - The actions you need to take to protect your organization’s email from these unknowns


    Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
  • The Hacker’s Mind: Episode #4 - How to Stop the Cyber Cat & Mouse Game Recorded: May 19 2020 12 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • Email Security: How to Protect from the Unknown with Simon Crosby Recorded: May 5 2020 36 mins
    Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
    BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.

    Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?

    Join us in this one-time discussion to better understand:

    - What makes rapidly evolving unknown threats our No. 1 enemy
    - The gaps of data-driven email security
    - Why model-driven security is the only way to deal with these threats
    - How to scale it while keeping end-user’s productivity
    - The actions you need to take to protect your organization’s email from these unknowns


    Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
  • The Hacker’s Mind: Episode #3 - The Payload and Execution Recorded: May 5 2020 15 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • CBTS & BitDam Present: The Blind Spots of Email Security Nobody Speaks About Recorded: Apr 30 2020 37 mins
    Brian Kubas at CBTS, Maor Hizkiev at BitDam and Roy Rashti, BitDam
    We invite you to join CBTS and BitDam for "The Blind Spots of Email Security Nobody Speaks About" as we discuss the shocking miss rates from leading providers: O365 ATP, Proofpoint TAP and G Suite Enterprise. Learn what blind spots your organization may have within your current email security.


    Join Brian Kubas, Network & Security Product Specialist at CBTS, Maor Hizkiev CTO & Co-founder at BitDam and Roy Rashti, Presale and Professional Services at BitDam to learn:

    - Why leading email security products show 23-35% miss rates
    - What is the cause of this huge detection gap?
    - How to protect your organization from these unknown threats
  • BitDam Advanced Threat Protection Closes The Current Gaps in Email Security Recorded: Apr 21 2020 32 mins
    Roy Rashti, BitDam Head of Presale & Professional Services, and António Abelha, General Manager of Digital Skills
    Email security is not as secure as you think. Unknown malicious files and links regularly bypass all the leading email security products - including Office 365 ATP, Proofpoint TAP and G Suite Enterprise - leaving enterprises vulnerable to email-based attacks including ransomware, phishing and data breaches.

    Join Roy Rashti, BitDam Head of Presale & Professional Services, and António Abelha, General Manager of Digital Skills to learn:

    - The miss rates of top email security solutions
    - What is the cause of this huge detection gap?
    - How to protect your organization from these unknown threats
    - Live demo of BitDam Advanced Threat Protection
  • The Hacker’s Mind: Episode #2 - How Hackers Deliver Attacks to Your Computer Recorded: Apr 21 2020 13 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.

    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)
  • The Hacker’s Mind: Episode #1 - How Hackers Plan Their Attacks Recorded: Apr 7 2020 18 mins
    Roy Rashti, Head of Presale & Professional Services at BitDam
    To really protect your business from cyber threats, you have to better understand your enemy.

    In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:

    • How hackers plan their attacks (episode #1)
    • How hackers deliver attacks to your computer (episode #2)
    • The payload and execution (episode #3)
    • How to stop the cyber cat & mouse game (episode #4)


    Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
  • The Blind Spots of Email Security That Nobody Speaks About Recorded: Mar 19 2020 23 mins
    Liron Barak, BitDam
    Email security is not as secure as you think. Unknown malicious files and links regularly bypass all the leading email security products, leaving enterprises vulnerable to email-based attacks including ransomware, phishing and data breaches.

    BitDam has recently conducted an empirical study to measure email security products' ability to detect Unknown Threats at First Encounter. Covering solutions including Office 365 ATP, Proofpoint TAP and G Suite Enterprise, the study findings show:

    - A miss rate of 20-40%
    - Time To Detect of 24-48 hours


    This Detection Gap keeps enterprises continually unprotected against unknown threats.
    Join Liron Barak, BitDam CEO & Co-founder to learn:

    - How we have conducted this empirical study
    - The full data from the study
    - What is the cause of this huge detection gap?
    - How to protect your organization from these unknown threats that bypass all email security products
For SOC professionals who want to solve malware once & for all
BitDam brings a pioneering approach to protection against malware.

Its cloud-based Advanced Threat Protection (ATP) blocks content-borne attacks delivered via email, cloud storage, and Instant Messaging, empowering organizations to collaborate safely.

Using an attack-agnostic technology, BitDam shows unprecedented detection rates, blocking malware from first sight.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CISOs Panel Discussion: Securing remote collaboration during a pandemic
  • Live at: Aug 13 2020 3:00 pm
  • Presented by: Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy
  • From:
Your email has been sent.
or close