Hi [[ session.user.profile.firstName ]]

Are your Security Controls yesterday’s news?

Are pen tests and vulnerability scans the thing of yesterday? What happens when traditional security testing methods fall short? Discover how Cymulate’s Breach and Attack solution helps optimize the effectiveness of your security controls, mitigates the risk level of each threat, and tests across the kill-chain.
Recorded Feb 11 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Bromiley, SANS Analyst and Incident Reporter & Eyal Aharoni, VP Customer Success, Cymulate
Presentation preview: Are your Security Controls yesterday’s news?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Does Your Security Assurance Program Meet Your Needs? Dec 8 2020 4:00 pm UTC 60 mins
    Speaker: Larry Ponemon, Ph.D Chairman and Founder, CIPP, Ponemon. Host: Moshe Elias, Director of Product Marketing, Cymulate
    Sixty percent of respondents say their organizations make daily or weekly changes to their security controls, while sixty-seven percent of respondents say that it is very important to test that these changes have not created security gaps. Additionally, seventy percent of respondents say it is important to validate the effectiveness of security controls against new threats and hacker tactics and techniques.
    And yet only 22% of respondents rate their level of confidence in their security controls as high.

    Attend this webinar to learn what your peers are saying:
    • About current security testing methods, and why they fall short
    • The impact of continuous change on their security posture
    • How business driven change in response to Covid-19 has made matters worse
    • What they see as the key benefits of continuous security validation
  • Purple Team Simulation - The next level of customization and automation Recorded: Nov 4 2020 52 mins
    Avihai Ben-Yossef and Moshe Elias
    Pen tests and red team exercises have always been resource intensive exercises involving valuable professionals with high levels of expertise.

    Cymulate BAS increases their operational efficiency by automating discovery through attack simulations and indeed it serves blue teams and security operations well by identifying security gaps and providing remediation guidance.

    But now we are taking it to the next level, the Purple Team Simulation module provides the customizability and sophistication required by in-house and service provider red-teams and pen-testers to craft and automate complex kill-chain scenarios.

    Attend this webinar where we will introduce and demo:
    The new Purple Team Simulation module that benefits companies to
    • Leverage and scale the expertise of central teams
    • Increase the operational efficiency of valuable experts through automation
    • Automate security assurance programs
  • How to make your network resistant to lateral movement Recorded: May 19 2020 51 mins
    John Leadford, Dir. Enterprise USA & Moshe Elias, Director of Product Marketing, Cymulate
    After gaining an initial foothold a hacker will use known techniques to propagate within your network in search of their objective. These techniques enable them to cloak their presence and escalate privileges to access high value assets undetected. Many of the techniques rely on vulnerability exploits, network misconfigurations and other weaknesses.
    Attend this webinar where we will discuss
    ➤ Lateral movement tactics & techniques
    ➤ How to discover network weaknesses that enable lateral movement
    ➤ What you can do to make your network more resistant to lateral movement
  • Breach and Attack Simulation (BAS) - Changing the Paradigm of Security Testing Recorded: Mar 31 2020 64 mins
    Moshe Elias, Director of Product Marketing, Cymulate
    Digital transformation and business agility are driving constant change in Enterprise IT architectures. Supply chain integration, cloud migration, IT/OT integration, and working from home are just some of the trends.

    Business agility and the dynamic and innovative threat landscape require a new approach to security testing that is accessible to companies of all sizes, continuous and safe to use in production environments.

    Key takeaways:

    ➤ How BAS enables you to perform continuous security validation.
    ➤ How customers are using the Cymulate BAS platform to check the security controls that protect both office and remote workers.
    ➤ How BAS adds value to security operations, blue and red teams.
  • The Threat Landscape is Dynamic – So Should Your Security Testing Recorded: Mar 11 2020 54 mins
    Moshe Elias, Director of Product Marketing, Cymulate & Sandy Carrieli, Principal Analyst, Forrester
    For almost 25 years penetration testing has been the staple of security operations.

    In today's dynamic business environments and evolving threat landscape, most organizations have no idea how effective their security technologies are, at any given point in time.

    This webinar will cover:

    ➤ The advantages and disadvantages of current and traditional security testing approaches
    ➤ How new approaches can provide results in real-time
    ➤ How Breach and Attack simulation is actually used by the security community

    Learn the different approaches to security testing and how breach and attack simulation can put your security posture on autopilot.
  • Are your Security Controls yesterday’s news? Recorded: Feb 11 2020 59 mins
    Matt Bromiley, SANS Analyst and Incident Reporter & Eyal Aharoni, VP Customer Success, Cymulate
    Are pen tests and vulnerability scans the thing of yesterday? What happens when traditional security testing methods fall short? Discover how Cymulate’s Breach and Attack solution helps optimize the effectiveness of your security controls, mitigates the risk level of each threat, and tests across the kill-chain.
  • 1-2-1 Interview - Cymulate, Cybertech Tel Aviv 2020 Recorded: Feb 4 2020 9 mins
    Gily Netzer, CMO
    Cymulate, Cybertech Tel Aviv 2020
    1-2-1 Interview - Gily Netzer, CMO
Breach and Attack Simulation Made Simple
Cymulate continuous security validation makes it simple to measure and improve your security posture across the full attack kill chain.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are your Security Controls yesterday’s news?
  • Live at: Feb 11 2020 12:15 pm
  • Presented by: Matt Bromiley, SANS Analyst and Incident Reporter & Eyal Aharoni, VP Customer Success, Cymulate
  • From:
Your email has been sent.
or close