Hi [[ session.user.profile.firstName ]]

Demo of Cyber Attack Simulation Platform - August 3rd, 2021

When we talk to security practitioners, we hear the same concerns again and again:

> How safe is my organization against ransomware right now?
> Do the security controls I have in place work as they should?
> Am I protected against the latest threats?

In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
Recorded Aug 3 2021 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike DeNapoli, Lead Solution Architect
Presentation preview: Demo of Cyber Attack Simulation Platform - August 3rd, 2021

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Demo of Cyber Attack Simulation Platform - October 26th, 2021 Oct 26 2021 3:00 pm UTC 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?
    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • The hackers did what?!?! Oct 20 2021 3:00 pm UTC 60 mins
    Mike DeNapoli hosting Graham Cluley, Security Analyst, grahamcluley.com
    “Never interrupt your enemy when he is making a mistake.” Napoleon Bonaparte

    Despite what they want you to think, not all hackers are geniuses. In fact, some of them have made a few really dumb mistakes. Luckily, most of those dumb mistakes lead to the cybercriminal being caught by authorities. These #hackerfails can lead to some entertaining stories!

    On the other hand, sometimes businesses make some crazy decisions that can result in a hack or data breach. Or a lucky mistake made by a hacker gets them into an area of an organization where they can wreak maximum havoc.

    Join us for this entertaining webinar as we discuss #facepalm moments in cybersecurity and how to ensure your company doesn’t end up making the same mistakes. Register today to hear podcaster/researcher/blogger Graham Cluley share some of the best #hackerfails and Cymulate’s Mike DeNapoli share how to better secure your organization through Continuous Security Validation!
  • Demo of Cyber Attack Simulation Platform - October 12th, 2021 Oct 12 2021 3:00 pm UTC 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?
    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Validación continua de seguridad en el sector educativo con Instituto de Empresa Oct 7 2021 4:00 pm UTC 60 mins
    Ignacio Medina Domingo, Information Security Manager, Instituto de Empresa; Daniela Kominsky, Country Manager Cymulate Iberia
    En el último año, el sistema educativo ha sido uno de los principales objetivos de los ciberdelincuentes. El Instituto de Empresa no lo ha dudado y ha apostado por la Validación Continua de Ciberseguridad para protegerse en este nuevo escenario.

    El próximo 7 de octubre queremos invitarte a un webinar para conocer cómo uno de los centros educativos de referencia a nivel internacional ha sido pionero en ciberprotección con el uso de la plataforma de Cymulate. De la mano de su Information Security Manager, Ignacio Medina Domingo, podrás conocer la estrategia de ciberseguridad del Instituto de Empresa, los beneficios conseguidos con la validación continua de ciberseguridad y, los casos de uso y mejores prácticas para de forma fácil, rápida y automática contar con información y datos específicos sobre las brechas de seguridad, priorizando los problemas y los procedimientos para mitigar el riesgo.

    Regístrate y en 45 minutos aprenderás:
    • Mejores prácticas de la validación continua de seguridad.
    • Cómo implementar de forma fácil y rápida una solución de validación continua en un centro educativo.
    • Análisis de la seguridad capa a capa con la tecnología de Cymulate. Demostración en vivo.

    Dirigido a: Responsables de seguridad o sistemas y tecnología de centros escolares, de formación y universidades y proveedores de servicios de seguridad.

    Ponentes:
    • Ignacio Medina Domingo, Information Security Manager, Instituto de Empresa.
    • Daniela Kominsky, Country manager Spain, Portugal and Italy, Cymulate.
    • Neftalí Mañes, Senior System Engineer, Cymulate.
  • Security Posture Validation Requirements Sep 28 2021 5:00 pm UTC 60 mins
    Craig Robinson, Program Director, IDC and Dave Klein, Director, Cyber Evangelist, Cymulate
    The newest generation of Security Posture Validation combines BAS (Breach Attack Simulation), CART (Continuous Automated Red Teaming), Purple Teaming, and ASM (Attack Surface Management). One comprehensive solution that’s become essential to the enterprises who have adopted them.

    Attend this event/online seminar to learn the requirements for an effective Posture Security Validation solution and how CISOs and security practitioners alike can easily implement, manage, and utilize the platform to the highest capability.

    About Craig Robinson, Program Director, IDC:
    Craig Robinson is a Program Director within IDC’s Security Services research practice, focusing on managed services, consulting, and integration. Mr. Robinson delivers unparalleled insight and analysis, leveraging his unique experience leading diverse IT teams across several industries. This expertise positions him to provide valuable thought leadership, research, and guidance to vendors, service providers, and clients worldwide.

    About Dave Klein, Director, Cyber Evangelist, Cymulate:
    Dave Klein is veteran cybersecurity professional with extensive enterprise, US federal and state, and local government experience. He has worked on many incident response cases and worked on the Presidential Directive for Critical Infrastructure Security and Resilience.
  • Demo of Cyber Attack Simulation Platform - September 28th, 2021 Sep 28 2021 3:00 pm UTC 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:
    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?
    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Reducing the Exposure of External and Internal Assets Recorded: Sep 22 2021 14 mins
    Dave Klein, Cybersecurity Evangelist Director
    Organizations are in a constant race to discover, prioritize and remediate vulnerable assets. Vulnerability assessments don’t take into account the effectiveness of compensating controls and the exploitability of vulnerabilities resulting in wasted efforts on non-critical patching.
    Cymulate has developed a holistic approach that discovers, analyzes and challenges the IT infrastructure to prioritize remediation based on the context of your specific environment. This approach combines Attack Surface Management (ASM) - to discover external accessible assets and identify and prioritize assets that are exposed to exploitation and a CVE centric approach to Security Control Validation to validate the effectiveness of compensating controls.
    Attend this webinar to learn how these methodologies enable security teams to identify and prioritize remediation activity of internal and external vulnerabilities that are critical to the security of their organization.
  • Demo of Cyber Attack Simulation Platform - September 14th, 2021 Recorded: Sep 14 2021 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Demo of Cyber Attack Simulation Platform - September 2nd, 2021 Recorded: Sep 2 2021 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Demo of Cyber Attack Simulation Platform - August 17th, 2021 Recorded: Aug 17 2021 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Demo of Cyber Attack Simulation Platform - August 3rd, 2021 Recorded: Aug 3 2021 27 mins
    Mike DeNapoli, Lead Solution Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Demo of Cyber Attack Simulation Platform - July 20th, 2021 Recorded: Jul 20 2021 31 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • How Adopting an Offensive Cybersecurity Strategy is the Best Defense Recorded: Jul 14 2021 61 mins
    Dave Klein hosting David Kennedy, Founder, CEO at TrustedSec
    Digital innovation which has fueled industry growth has also being used extensively by our adversaries. Through continuous digital innovation research, collaboration, automation and orchestration we have seen a dramatic increase in success by both nation-state and criminal threat actors. Although our monetary investments in security were at an all-time high, in 2020, we experienced the largest amount of data breaches on record. This talk dives into how various adversaries ranging from Ransomware and to Nation State actors are attacking organizations with a high level of success and how by understanding and even adopting some of these offensive techniques offer the best methods to build defensive strategies against them.

    David Kennedy is a regular contributor and subject matter expert on cybersecurity stories for Fox News, CNN, Bloomberg, BBC, and other high-profile media outlets. Further, his tools have been featured on TV shows and movies, and he served as Technical Consultant for the critically acclaimed Mr. Robot TV show.

    Dave Klein is a veteran cybersecurity professional with extensive enterprise, US federal and state and local government experience. He has worked on many incident response cases and worked on the Presidential Directive for Critical Infrastructure Security and Resilience.
  • The 5 Steps to Building an Effective SOC Optimization Program Recorded: Jul 7 2021 26 mins
    Avihai Ben-Yossef, Co-Founder & CTO at Cymulate
    Preventive security controls are insufficient to protect an organization effectively. They have to work in tandem with detection, threat hunting, and incident response capabilities.
    Companies that take a proactive stance to defend their critical assets rely on the people, processes, and technologies that go into their SOC to detect and thwart malicious activity.
    This creates the demand for ongoing optimization in the face of a dynamic threat landscape.
    Attend this session to learn:
    · How to apply MITRE ATT&CK in the detection development process
    · How to develop and validate detections in an environment that lacks homogeneity
    · How to leverage automation and build a continuous program of SOC validation
  • Demo of Cyber Attack Simulation Platform - June 30th, 2021 Recorded: Jun 30 2021 31 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • How to Confront Supply Chain Attacks and Ransomware Recorded: Jun 22 2021 40 mins
    Moshe Elias, Product Marketing Director and Dave Klein, Cyber Evangelist Director
    Cybersecurity professionals operate in a dynamic environment driven by two accelerating forces; threat developments and the rapid adoption of new technologies and digital business initiatives.
    And yet, most companies still rely on discrete snapshots of their security performance.
    CISO’s and security teams must be ready to confront new threat vectors, including human-powered ransomware and supply chain attacks, with an agile, continuous approach to security validation and constant improvement.

    View this webinar to discover how to:
    • Pinpoint and address security deficiencies related to supply chain attacks and ransomware.
    • Validate EDR detection of lateral movement, command and control, and privilege escalation techniques.
    • Increase the operational efficiency of security teams with automated security testing.
  • Validación continua de ciberseguridad para todos-Caso de éxito de Singular Bank Recorded: Jun 16 2021 60 mins
    Damián Soriano, CISO Singular Bank. Daniela Kominsky, Country manager Iberia at Cymulate
    Todas las empresas, independientemente de su tamaño, cuentan ahora más que nunca con infraestructuras de red y de TI en constante cambio, viéndose continuamente afectadas por amenazas en constante y creciente evolución. Ante un escenario dinámico, la solución para proteger los activos es una validación continua de la ciberseguridad.

    En este webinar conocerás de forma práctica como el banco digital Singular Bank, una entidad de tamaño medio, utiliza la plataforma de validación continua de ciberseguridad de Cymulate para evaluar y mejorar de forma completa su postura de seguridad. De la mano de su CISO, Damián Soriano, podrás conocer los casos de uso y mejores prácticas para de forma fácil, rápida y automática contar con información objetiva sobre las brechas de seguridad de la red, priorizando los problemas y los procedimientos para mitigar el riesgo.


    Regístrate y en 45 minutos aprenderás:
    - Mejores prácticas de la validación continua de seguridad.
    - Cómo implementar de forma fácil y rápida una solución de validación continua en una empresa de tamaño medio.
    - Casos de uso de la tecnología Cymulate para todos los vectores y aspectos de un ataque completo. Demostración en vivo.

    Dirigido a: responsables, directores y consultores de ciberseguridad de los sectores sanitario, retail, eCommerce, educación, servicios legales o consultoras entre otros.

    Sobre Cymulate:
    Cymulate es la plataforma SaaS de validación continua de ciberseguridad, estándar de la industria y basada en el marco MITRE ATT&CK® de extremo a extremo. La plataforma permite a las empresas desafiar, evaluar y optimizar su postura de ciberseguridad frente a un escenario dinámico y creciente de amenazas, de forma fácil, rápida y continua. Actualmente, cientos de clientes en todo el mundo utilizan Cymulate, te esperamos en este webinar para que descubras lo que te podemos aportar este 2021.
  • Demo of Cyber Attack Simulation Platform - June 15th, 2021 Recorded: Jun 15 2021 31 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Demo of Cyber Attack Simulation Platform - June 2nd, 2021 Recorded: Jun 2 2021 30 mins
    Arien Seghetti, Solutions Architect
    When we talk to security practitioners, we hear the same concerns again and again:

    > How safe is my organization against ransomware right now?
    > Do the security controls I have in place work as they should?
    > Am I protected against the latest threats?

    In our live demo, we will take you through how continuous security validation can help you answer those questions and more.
  • Pull your SOC up with continuous security validation and optimization Recorded: May 26 2021 22 mins
    David Klein, Director, Cyber Evangelist
    Today’s enterprises are dynamic, changing all the time. Attackers are as well. Traditional methods of validation cannot keep up. Protecting your organization requires developing automated and continuous methodology for security control optimization and a better methodology to nurture and educate your SOC cyber-defenders as they do. In this webinar we look at how adopting an offensive cybersecurity strategy by adopting Breach Attack Simulation methodology to easily and effectively optimize your SoC’s people, processes and security controls.

    Attend this event/webinar to learn:
    • Why SOC validation is crucial in confronting threat evolutions.
    • The elements of a continuous SOC validation and improvement program.
    • How continuous and automated red teaming and BAS make SOC validation achievable with existing resources.
    Dave Klein is a veteran cybersecurity professional with extensive enterprise, US federal and state and local government experience. He has worked on many incident response cases and worked on the Presidential Directive for Critical Infrastructure Security and Resilience.
Breach and Attack Simulation Made Simple
Cymulate continuous security validation makes it simple to measure and improve your security posture across the full attack kill chain.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Demo of Cyber Attack Simulation Platform - August 3rd, 2021
  • Live at: Aug 3 2021 4:00 pm
  • Presented by: Mike DeNapoli, Lead Solution Architect
  • From:
Your email has been sent.
or close