Cert2Connect - Stay ahead of Cyberattacks with Breach & Attack Simulation
Join us in a webinar on September 10th, on Breach and Attack Simulation and how to stay ahead of cyberattacks.
We will discuss:
➤ How BAS enables you to perform continuous security validation.
➤ How customers are using the Cymulate BAS platform to check the security controls that protect both office and remote workers.
➤ How BAS adds value to security operations, blue and red teams.
RecordedSep 10 202058 mins
Your place is confirmed, we'll send you email reminders
Mike Denapoli hosting Lisa Forte, Partner at Red Goat Cyber Security
In spite of all the technology in place to prevent a data breach attackers will find a way in. After all, they only need one inroad to be successful.
To deal with this reality companies are investing in detection technologies and services, and developing the skills to investigate and manage incidents.
Unfortunately many find themselves learning during a live event, not a good idea.
Cymulate is honoured to host Lisa Forte, Partner at Red Goat Cyber Security to talk about:
• Why we need to urgently update our incident plans
• Why incidents are not the time to practice your improv skills
• The big mistakes you need to avoid
• How a great response can boost your reputation
The year 2021 is upon us and security testing has come a long way.
But when we talk to security practitioners, we hear the same concerns again and again:
> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?
In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
Daniela Kominsky, Neftalí Mañes, Carlos Manchado Martin, Gorka Díaz de Orbe
El 60% de las empresas realiza cambios a diario o semanales en sus controles de seguridad, mientras que el 67% señala la importancia de comprobar que estas actualizaciones no suponen brechas de seguridad, según revela un reciente estudio realizado por el Instituto Ponemon. Por su parte, el 60% reconoce que es fundamental validar la efectividad de los controles de seguridad contra las nuevas amenazas y las tácticas y las técnicas de los cibercriminales, aunque sólo el 22% califica como alta la confianza en sus controles de seguridad.
Desde Cymulate, queremos invitarte a un evento virtual que tendrá lugar el próximo 2 de marzo a las 18:00h (CET). Durante la sesión, presentaremos los principales resultados del estudio de Ponemon y hablaremos con los CISOs de Bankia y Naturgy, quienes explicarán las principales ventajas que proporciona una validación continua de la seguridad en sus empresas.
Los puntos clave que analiza el estudio son:
• Cuál es el impacto de los cambios continuos en la postura de seguridad.
• Cómo los cambios impulsados por las empresas para adaptarse a la Covid-19 han empeorado la situación.
• Cuáles son las principales ventajas que las empresas ven en la validación continua de la seguridad.
Agenda:
18:00h - Resultados del estudio Ponemon - La necesidad de una validación continua de la seguridad
18:20h - Mejores prácticas en seguridad de la mano de Carlos Manchado Martin, CISO de Naturgy, y Gorka Díaz de Orbe, CISO de Bankia
18:40h - ¿Qué es la tecnología Breach and Attack Simulaton (BAS)? Presentación y demostración de Cymulate
18:50h - Ruegos y preguntas
Host: Daniela Kominsky, Country Manager Iberia and LATAM, Cymulate.
Speakers: Carlos Manchado Martin, CISO de Naturgy, y Gorka Díaz de Orbe, CISO de Bankia.
The year 2021 is upon us and security testing has come a long way.
But when we talk to security practitioners, we hear the same concerns again and again:
> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?
In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
Security flaws, hackers and data breaches are the new normal. It’s not just those of us in the industry facing these foes every single day, it’s everyone. Whether you’re online or offline, you simply cannot exist today without your personal information being digitised in systems which are often left vulnerable and exploited at the whim of attackers. But who are these people, the ones who seek to break through our defences and exploit our data? And how are they continually so effective at doing so, despite our best efforts?
Cymulate is proud to sponsor this talk, in which you’ll hear from the creator of “Have I Been Pwned” about the lessons he’s learned after processing more than 10B records of breached data. You’ll get a glimpse behind the scenes of what caused some of these devastating incidents and how they continue to wreak havoc today, despite how much more aware the industry is becoming. It’s a frightening, eye-opening and entertaining look at infosec and data breaches.
Brought to you by Cymulate:
For companies that want to assure their security against the evolving threat landscape. Cymulate SaaS-based Continuous Security Validation automates security risk assessments end-to-end, enabling them to challenge, assess and optimize their cyber-security posture simply and continuously. Because security professionals need to know and control their dynamic environment.
The year 2021 is upon us and security testing has come a long way.
But when we talk to security practitioners, we hear the same concerns again and again:
> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?
In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
The year 2021 is upon us and security testing has come a long way.
But when we talk to security practitioners, we hear the same concerns again and again:
> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?
In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
The year 2021 is upon us and security testing has come a long way.
But when we talk to security practitioners, we hear the same concerns again and again:
> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?
In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
Speaker: Larry Ponemon, Ph.D Chairman and Founder, CIPP, Ponemon. Host: Moshe Elias, Director of Product Marketing, Cymulate
Sixty percent of respondents say their organizations make daily or weekly changes to their security controls, while sixty-seven percent of respondents say that it is very important to test that these changes have not created security gaps. Additionally, seventy percent of respondents say it is important to validate the effectiveness of security controls against new threats and hacker tactics and techniques.
And yet only 22% of respondents rate their level of confidence in their security controls as high.
Attend this webinar to learn what your peers are saying:
• About current security testing methods, and why they fall short
• The impact of continuous change on their security posture
• How business driven change in response to Covid-19 has made matters worse
• What they see as the key benefits of continuous security validation
Pen tests and red team exercises have always been resource intensive exercises involving valuable professionals with high levels of expertise.
Cymulate BAS increases their operational efficiency by automating discovery through attack simulations and indeed it serves blue teams and security operations well by identifying security gaps and providing remediation guidance.
But now we are taking it to the next level, the Purple Team Simulation module provides the customizability and sophistication required by in-house and service provider red-teams and pen-testers to craft and automate complex kill-chain scenarios.
Attend this webinar where we will introduce and demo:
The new Purple Team Simulation module that benefits companies to
• Leverage and scale the expertise of central teams
• Increase the operational efficiency of valuable experts through automation
• Automate security assurance programs
John Leadford, Dir. Enterprise USA & Moshe Elias, Director of Product Marketing, Cymulate
After gaining an initial foothold a hacker will use known techniques to propagate within your network in search of their objective. These techniques enable them to cloak their presence and escalate privileges to access high value assets undetected. Many of the techniques rely on vulnerability exploits, network misconfigurations and other weaknesses.
Attend this webinar where we will discuss
➤ Lateral movement tactics & techniques
➤ How to discover network weaknesses that enable lateral movement
➤ What you can do to make your network more resistant to lateral movement
Moshe Elias, Director of Product Marketing, Cymulate
Digital transformation and business agility are driving constant change in Enterprise IT architectures. Supply chain integration, cloud migration, IT/OT integration, and working from home are just some of the trends.
Business agility and the dynamic and innovative threat landscape require a new approach to security testing that is accessible to companies of all sizes, continuous and safe to use in production environments.
Key takeaways:
➤ How BAS enables you to perform continuous security validation.
➤ How customers are using the Cymulate BAS platform to check the security controls that protect both office and remote workers.
➤ How BAS adds value to security operations, blue and red teams.
Moshe Elias, Director of Product Marketing, Cymulate & Sandy Carrieli, Principal Analyst, Forrester
For almost 25 years penetration testing has been the staple of security operations.
In today's dynamic business environments and evolving threat landscape, most organizations have no idea how effective their security technologies are, at any given point in time.
This webinar will cover:
➤ The advantages and disadvantages of current and traditional security testing approaches
➤ How new approaches can provide results in real-time
➤ How Breach and Attack simulation is actually used by the security community
Learn the different approaches to security testing and how breach and attack simulation can put your security posture on autopilot.
Matt Bromiley, SANS Analyst and Incident Reporter & Eyal Aharoni, VP Customer Success, Cymulate
Are pen tests and vulnerability scans the thing of yesterday? What happens when traditional security testing methods fall short? Discover how Cymulate’s Breach and Attack solution helps optimize the effectiveness of your security controls, mitigates the risk level of each threat, and tests across the kill-chain.
Cert2Connect - Stay ahead of Cyberattacks with Breach & Attack SimulationTim Ager and Reinier Landsman[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins