Hi [[ session.user.profile.firstName ]]

Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them

Attackers Are Exploring the Hidden Recesses of Your Attack Surface: How You Can Get There First

When attackers explore your attack surface, they are both business-like and serendipitous. They are seeking the easy, “off the beaten” path entry points to get where they want to go. If your security team takes a “planned itinerary with designated stops” approach to surveying and protecting your attack surface, your security team and the attacker may never cross paths. But there are ways to anticipate their seemingly random routes.

Tune into this webinar titled, “Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them” to learn why:

- Attackers are most likely to be surveying the areas of your attack surface where you don’t think to look
- Every security team should be blocking the paths of least resistance in their attack surface
- Your attack surface management approach must be both automated and continuous


Presenter: Raphael Reich, VP of Product Marketing at CyCognito

Presenter Bio: Raphael Reich, Vice President Product Marketing, has held cybersecurity leadership roles for the past 20 years and contributed to IPOs at Imperva, Varonis and Echelon. Prior to joining CyCognito, he was Head of Product Marketing at Contrast Security, where he built the product marketing and product management teams and helped drive ~100% year-over-year revenue growth through compelling content, sales tools and campaigns.
Recorded May 21 2020 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Raphael Reich, VP of Product Marketing at CyCognito
Presentation preview: Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them Jun 3 2020 6:00 pm UTC 39 mins
    Raphael Reich, VP of Product Marketing at CyCognito
    Attackers Are Exploring the Hidden Recesses of Your Attack Surface: How You Can Get There First

    When attackers explore your attack surface, they are both business-like and serendipitous. They are seeking the easy, “off the beaten” path entry points to get where they want to go. If your security team takes a “planned itinerary with designated stops” approach to surveying and protecting your attack surface, your security team and the attacker may never cross paths. But there are ways to anticipate their seemingly random routes.

    Tune into this webinar titled, “Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them” to learn why:

    - Attackers are most likely to be surveying the areas of your attack surface where you don’t think to look
    - Every security team should be blocking the paths of least resistance in their attack surface
    - Your attack surface management approach must be both automated and continuous


    Presenter: Raphael Reich, VP of Product Marketing at CyCognito

    Presenter Bio: Raphael Reich, Vice President Product Marketing, has held cybersecurity leadership roles for the past 20 years and contributed to IPOs at Imperva, Varonis and Echelon. Prior to joining CyCognito, he was Head of Product Marketing at Contrast Security, where he built the product marketing and product management teams and helped drive ~100% year-over-year revenue growth through compelling content, sales tools and campaigns.
  • Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them Recorded: May 21 2020 40 mins
    Raphael Reich, VP of Product Marketing at CyCognito
    Attackers Are Exploring the Hidden Recesses of Your Attack Surface: How You Can Get There First

    When attackers explore your attack surface, they are both business-like and serendipitous. They are seeking the easy, “off the beaten” path entry points to get where they want to go. If your security team takes a “planned itinerary with designated stops” approach to surveying and protecting your attack surface, your security team and the attacker may never cross paths. But there are ways to anticipate their seemingly random routes.

    Tune into this webinar titled, “Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them” to learn why:

    - Attackers are most likely to be surveying the areas of your attack surface where you don’t think to look
    - Every security team should be blocking the paths of least resistance in their attack surface
    - Your attack surface management approach must be both automated and continuous


    Presenter: Raphael Reich, VP of Product Marketing at CyCognito

    Presenter Bio: Raphael Reich, Vice President Product Marketing, has held cybersecurity leadership roles for the past 20 years and contributed to IPOs at Imperva, Varonis and Echelon. Prior to joining CyCognito, he was Head of Product Marketing at Contrast Security, where he built the product marketing and product management teams and helped drive ~100% year-over-year revenue growth through compelling content, sales tools and campaigns.
  • Distributed Beyond Control: The Need for Attack Surface Visibility Recorded: Aug 27 2019 48 mins
    Rob Gurzeev, CEO, CyCognito and Josh Zelonis, Principal Analyst, Forrester
    IT environments have become so vastly distributed that an organization’s attack surface now extends well-beyond the infrastructure they can effectively control. And that puts you in a precarious situation.

    Whether you’re managing global subsidiaries, utilizing cloud platforms, or contracting as-a-service offerings, your digital assets and infrastructure are exposed to risk. How can you take back control?

    Join CyCognito CEO, Rob Gurzeev, and special guest, Forrester Principal Analyst, Josh Zelonis, for a conversation on the growing need for attack surface visibility.

    In this webinar, you’ll learn:
    - How to best identify all of your digital assets, including those you may not even know about
    - How applying offensive-style reconnaissance sheds light on blind spots
    - Why prioritization is key to effective blind spot elimination
    - Leveraging internet-scale scanning and a graph data model

    Take the next steps towards security for the modern enterprise. Register now.
  • Attack Surface Visibility Recorded: Jul 11 2019 1 min
    Randy Watkins
    Why Map Your Attack Surface? Critical Start CTO Randy Watkins explains.
ELIMINATE SHADOW RISK - ATTACK SURFACE MANAGEMENT REDEFINED
CyCognito is solving one of the most fundamental business problems in cybersecurity: the need to understand how attackers view your organization, where they are most likely to break in and how you can eliminate that risk. CyCognito was founded by national intelligence agency veterans whose understanding of how attackers exploit blind spots led them to create a new approach to risk assessment. The Palo Alto-based company is funded by leading Silicon Valley venture capitalists and its mission is to help organizations eliminate their “shadow risk” — critical security risk that is often unknown to them. The volume of these unknown unknowns has widened dramatically as organizations have transformed from IT environments with well-defined perimeters to hyperconnected, fluid IT ecosystems that span on-premises, cloud, partner and subsidiary environments. CyCognito addresses shadow risk with a category-defining, transformative platform that automates offensive cybersecurity operations to provide reconnaissance capabilities superior to those of attackers.

Its next-generation security risk assessment platform enables Fortune 500 and other leading companies around the world to autonomously discover, understand, prioritize and eliminate their organization’s shadow risk based upon a global analysis of their external attack surface and the attack vectors that a real attacker would likely exploit. For more information, please visit cycognito.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Attackers Don’t Play by the Rules but There is a Playbook for Defeating Them
  • Live at: May 21 2020 6:00 pm
  • Presented by: Raphael Reich, VP of Product Marketing at CyCognito
  • From:
Your email has been sent.
or close