Hi [[ session.user.profile.firstName ]]

See How SafeBreach Helps Validate Your Security Controls and Reduce Cyber Risk

How many security controls are in your security stack? Get visibility into the performance of your security controls using the largest Hacker's Playbook in the industry.
In this video, see how SafeBreach helps you justify your security investments, strengthen your defenses, and drive risk down with the industry's most robust security control validation. Test your security posture against the latest threats and threat groups to ensure you can identify and close any gaps before attackers do.
Recorded May 13 2021 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
SafeBreach
Presentation preview: See How SafeBreach Helps Validate Your Security Controls and Reduce Cyber Risk

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Identify, Quantify, and Remediate Attacks on the COVID Vaccine Cold Chain Recorded: Jun 22 2021 52 mins
    Colin Connor- Global Threat Intelligence Strategic Analyst, IBM X-Force Threat Intelligence and Itzik Kotler- CTO, SafeBreach
    When nation-state actors and organized cybercriminals began sophisticated attacks in mid-2020 against the supply chain for COVID vaccines, IBM X-Force warned governments and healthcare entities of the danger. These were not merely isolated attacks against HVAC suppliers. The attacks began even before Pfizer or Moderna had authorization, involved spoofing of legitimate healthcare executives, and aimed at stealing vaccines and sabotaging their delivery while undermining governmental credibility. What happened behind the scenes is an intriguing use of quantitative frameworks in combination with breach and attack simulation (BAS) to confront a multi-faceted global attack.

    In this session Colin and Itzik will discuss:

    -The highly sophisticated COVID Cold Chain attacks
    -The quantitative framework we used to assess the gravity of the threats
    -What made this an outlier threat, and why we informed customers that it’s quantifiably more dangerous than other COVID-focused attacks.
    -How we leveraged automated breach and attack simulation to identify the attacks and determine what remediations were necessary and validate them once they were carried out, ensuring they would be effective in blocking attacks.
    -How to run a comprehensive threat analysis program to block attacks targeting healthcare and COVID-facing organizations.
    -Ways to automate remediation steps based on risk metrics and then continuously tune threat intelligence and vulnerability engines to progressively improve security posture and drive risk down.
  • How to Operationalize Threat Intelligence at Scale to Reduce Cyber Risk Recorded: Jun 10 2021 59 mins
    Yotam Ben Ezra, Vice President of Product, SafeBreach and Brian Kime, Senior Analyst, Forrester
    An effective security architecture requires insights into your organization's threat landscape, but many security professionals are disappointed in the results of their threat intelligence efforts. Learn how you can integrate threat intelligence with breach and attack simulation to quickly and effectively validate if your controls are configured properly to prevent or detect the latest attack that threatens your business to gain the most of your threat intelligence investment. Turn knowledge of the threat landscape into safe attacks that execute, at scale, across your infrastructure to identify the potential business impact and gain actionable remediation insights to close up security gaps to reduce your cyber risk.

    Join SafeBreach and guest Forrester for a webinar discussion to learn:
    -The critical components of an effective threat intelligence program
    -The benefits of an intelligence-driven security strategy
    -How to operationalize Threat Intelligence with Breach and Attack Simulation
    -The value of visualizing the performance of your security controls against the latest threats
    -How data-driven visibility into your security posture can translate into a reduction of risk
  • How to Visualize Your Security Posture With SafeBreach Dashboards Recorded: Jun 1 2021 35 mins
    Valeriy Leykin, Director Product Management and Eliazer Sikuriansky, Product Manager, SafeBreach
    Learn how to make more sense of your security data by visualizing it with SafeBreach Dashboards.
    In this webinar, we'll show you how our out-of-the-box and custom Dashboard features can help improve your security visibility, reporting, and your ability to share insights and data with other stakeholders and executives within your organization.

    You'll hear from members of the SafeBreach Product team as they demonstrate common Dashboard use cases, show you the latest functionality, and answer your questions about how to get the most benefit from this critical capability.
  • See How SafeBreach Helps You Identify & Prioritize Exploitable Vulnerabilities Recorded: May 13 2021 4 mins
    SafeBreach
    Vulnerability scans generate a large list of high-priority patches and teams cannot keep up. To solve this, SafeBreach helps you correlate the scans with validating security controls to gain insight into which vulnerabilities are actually exploitable in your environment. Then prioritize remediation to focus on what matters first. The outcome: fewer resources spent, but stronger protection and reduced risk.
  • See How SafeBreach Helps You Validate the Security of Critical Cloud Operations Recorded: May 13 2021 3 mins
    SafeBreach
    Validate your cloud and container security by executing attacks that test your cloud control (CSPM) and data (CWPP) planes to ensure the security of your critical cloud operations. Identify the choke points of your cloud security and gain a holistic understanding of where your cloud policies and controls are failing across your IaaS, PaaS and Container environments.
  • See How SafeBreach Helps Your Security Team Keep Pace with the Latest Threats Recorded: May 13 2021 4 mins
    SafeBreach
    In this video you'll learn how the largest playbook of attack simulations in the industry will help keep your organization safe against the latest threats. Our dedicated research team monitors the threat landscape, adds and updates attacks to ensure you have a comprehensive view of your organization's security posture against the current threat landscape.
    Filter our Hacker's Playbook by threat types, threat groups, MITRE TTPs, attack phases, security control category, and many others to test your security defenses, and ensure that red and blue teams get visibility into the performance of the security controls so you can take proactive action to close any gaps before an attacker can exploit them.
  • See How SafeBreach Helps Validate Your Security Controls and Reduce Cyber Risk Recorded: May 13 2021 3 mins
    SafeBreach
    How many security controls are in your security stack? Get visibility into the performance of your security controls using the largest Hacker's Playbook in the industry.
    In this video, see how SafeBreach helps you justify your security investments, strengthen your defenses, and drive risk down with the industry's most robust security control validation. Test your security posture against the latest threats and threat groups to ensure you can identify and close any gaps before attackers do.
  • SafeBreach March Demo Webinar: Risk-Based Vulnerability Management Recorded: Mar 25 2021 52 mins
    Mansoor Raza, Tomer Bar, Valeriy Leykin
    Learn about the unique value Breach and Attack Simulation can provide for Risk-Based Vulnerability Management. Members of the SafeBreach SE, Product, and SafeBreach Labs teams demonstrate how we help optimize your configurations, investments, and reporting within a matter of days.
  • SafeBreach Dashboards: Threat Assessment Dashboard Walk-Through Recorded: Feb 25 2021 4 mins
    SafeBreach
    Learn how you can test the efficacy of your security controls and gain insights into your security posture to help drive down risk with the SafeBreach Threat Assessment Dashboard.
  • Introducing SafeBreach Dashboards: CISO Dashboard Walk-Through Recorded: Feb 25 2021 4 mins
    SafeBreach
    Learn how CISOs and security executives can use SafeBreach Dashboards to transform data into actionable visualizations in order to align security investments to business goals, drive business impact, validate your security controls, and reduce risk.
  • Mergers & Acquisitions Security Validation: An Explainer Recorded: Feb 25 2021 3 mins
    SafeBreach
    New acquisitions may come with unrevealed security liabilities. With SafeBreach you can get an accurate, quantitative view of a target company's security posture by running a security baseline against their defenses with accuracy and speed. Then enable the right business decisions. Watch the video to learn more.
  • Threat Assessment: An Explainer Recorded: Feb 25 2021 3 mins
    SafeBreach
    The threat landscape constantly evolves and changes, forcing your team to shift focus in its search for security gaps. You need a platform in place that will help you proactively report to executives on your risk posture and get a mitigation plan in place before attackers can exploit the gaps. Learn more in this explainer video.
  • Risk-Based Vulnerability Management: An Explainer Recorded: Feb 25 2021 3 mins
    SafeBreach
    Vulnerability scans generate a long list of high-priority patches and security teams often cannot keep up. To resolve this, correlate the scans with validating security controls to gain insight into which vulnerabilities are actually exploitable within your environment. Then prioritize remediation to focus on what matters first. The outcome: fewer resources spent, but stronger protection and reduced overall risk. Watch our video to learn more about how SafeBreach can help.
  • Security Control Validation: An Explainer Recorded: Feb 25 2021 3 mins
    SafeBreach
    Organizations have, on average, 70-100 different security controls in their stack, but no visibility into their effectiveness. The biggest reason that security controls fail is that they are not configured correctly, or that they "drift" over time. With SafeBreach you can maximize the efficiency and efficacy of the security controls you have by seeing how they perform during an attack. Then you can fix the gaps before attackers can exploit them. Watch our video to learn more about how we help.
  • SafeBreach January 2021 Demo Webinar Replay Recorded: Jan 26 2021 29 mins
    Michael De Groat, Sales Engineering Director at SafeBreach
    See a demo of the SafeBreach platform and to learn about best practices for validating your security controls, and proactively guarding your organization against the latest threats.

    During this demo webinar we show you how running tens of thousands of attacks from the Hacker's Playbook against your organization's security stack could help you optimize your configurations, investments, and reporting within a matter of days. In addition, we offer an overview of the new SafeBreach Dashboards feature release which allows you to build rich visualizations in order to align stakeholders and drive business impact.
  • SolarWinds and Beyond: Validate That Your Controls Aren’t Vulnerable to a Supply Recorded: Dec 18 2020 29 mins
    Itzik Kotler, CTO and Tomer Bar, Research Team Lead
    The Cybersecurity and Infrastructure Security Agency (CISA) issued an Active Exploitation notice against highly sophisticated, manual supply chain attacks on a specific version of SolarWinds Orion Platform software.

    Within 24 hours of the notification, SafeBreach Labs added coverage for the US-CERT Active Exploitation notice of SolarWinds Software by adding new attack methods to our Hacker’s Playbook(™).

    Hear from SafeBreach CTO, Itzik Kotler, and Research Team Lead, Tomer Bar, who will cover:
    -what is currently known about these latest attack techniques and how they could impact your business
    -how you can proactively safeguard your business against the SUNBURST and SUPERNOVA threats and related exploits
    -how to validate your security controls on a continuous basis to identify security gaps and rapidly remediate them
  • Are you protected from a resurgence of APT29? Recorded: Nov 3 2020 48 mins
    Michael De Groat, SE Team Leader at SafeBreach, and Tomer Bar, Research Team Leader at SafeBreach
    ow can you be sure that your business is secure against advanced threat groups such as APT29? Facing todays threat landscape, cybersecurity teams need to stay ahead of attackers and the latest threat groups. MITRE ATT&CK provides a framework to understand your security posture. But how do you operationalize the MITRE ATT&CK framework and leverage it to validate your controls against these threat groups.

    Join Michael De Groat, SE Team Leader at SafeBreach, and Tomer Bar, Research Team Leader at SafeBreach, as they discuss:

    - The tactics, techniques, and procedures (TTPs) used by the Russian
    hacker group
    - Latest APT29 activity targeting COVID
    - How to quickly visualize security posture and harden defenses against
    APT29 using the MITRE framework
    - How to evaluate security solutions with simulated attacks from APT29 and
    other notorious threat groups
  • Reduce the Attack Surface by Validating Cloud IaaS and Container Security Recorded: Oct 28 2020 50 mins
    Yotam Ben Ezra, VP of Product at SafeBreach and Eran Segal, Security Researcher
    DevOps and Security teams experience an ongoing struggle of balancing innovation and moving the business forward, with implementing security best practices to keep these new environments secure.

    In the cloud native environment, some security concerns are less relevant and other security surfaces appear. A New range of security controls and best practices emerged to handle the new paradigm.

    Even though cloud security is a top concern for IT organizations, it is still difficult to safely and continuously validate that cloud infrastructure and container security controls are actually effective in protecting the environment without impacting production. Without insight into your cloud and container environments, you are at risk of attackers using these gaps in cloud security.

    In this webinar, you will learn:
    • How to validate the security of your cloud stack by continuously testing your Cloud Native environment with Docker and AWS simulations
    • How to align both DevOps and Security teams in validating controls
    • How you can prevent a CapitalOne type of breach
  • Emotet schlägt zurück – Wie Sie akute Bedrohungen stoppen Recorded: Oct 7 2020 46 mins
    Alexander Benoit, Lead Security Analyst, sepago GmbH and Tomer Bar, Research Team Leader, SafeBreach Labs
    Nachdem die Aktivitäten des Trojaners Emotet Anfang 2020 immer weiter zurückgegangen sind und
    schließlich völlig eingestellt wurden, nahmen viele an, dass dieser nun für immer verschwunden sei.
    Doch am 17. Juli diesen Jahres tauchte die Malware-Bedrohung wieder auf, dieses Mal durch neue E- Mail-Kampagnen mit schadhaften URLs oder Anhängen.

    Die Akteure im Hintergrund nutzten die globale Pandemie und den damit verbundenen Wandel hin
    zu mobilen Arbeitsplätzen aus, um Malware über Phishing-Kampagnen an ahnungslose Benutzer zu
    versenden.

    Alle IT-Sicherheitsabteilungen stehen nun vor der Herausforderung, auf das erhöhte Angriffsrisiko zu
    reagieren und die Sicherheitskontrollen weiter auszubauen, um das Unternehmen und die
    Mitarbeiter standortunabhängig zu schützen.

    Erfahren Sie in diesem Webinar:
    ▪ Die neuesten Methoden und Angriffsszenarien von Emotet, wie es infiltriert und was es als
    nächstes tut.
    ▪ Welche Prioritäten Sie zum Schutz vor einem Angriff in Ihrer IT-Umgebung setzen sollten.
    ▪ Warum Simulationen von Angriffen eine nachhaltige Alternative zu Penetrationstests sind und wie Sie damit kontinuierlich einen effektiven Sicherheitsstatus
    realisieren können.
    ▪ Wie die Zusammenarbeit von sepago und SafeBreach Ihnen helfen kann
    Sicherheitskontrollen zu validieren und die Frage zu beantworten – Wie gut sind Sie heute
    aufgestellt, um auf Emotet und andere Bedrohungen zu reagieren, oder besser, sie zu
    stoppen?
  • Prioritize Patching with Risk Based Vulnerability Management Recorded: Sep 17 2020 64 mins
    Steven Roesing, CEO at ASMGi and Dave Armstrong, CISO, The Judge Group
    Vulnerability and threat intelligence frameworks don’t account for the security controls deployed in your organization. Without insight into what attacks would be blocked by your security controls to prevent vulnerabilities from being exploited, there is no way to effectively measure the risk to your organization.

    Join us to learn:
    - How to reduce the attack surface by prioritizing vulnerabilities based on their actual business risk.
    - How to make a real difference in your security posture by prioritizing vulnerabilities and correlating
    with your security controls.
    -How to gauge the importance of a vulnerability based on the attack surface it can target, its
    reachability for external attackers, the chances it will give access to a critical asset, and the blast
    radius or potential reach of the vulnerability.
SafeBreach
SafeBreach is a leader in breach and attack simulation. The company’s groundbreaking patented platform provides a “hacker’s view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve security operations center (SOC) analyst response. SafeBreach automatically executes thousands of breach methods from its extensive and growing Hacker’s Playbook™ of research and real-world investigative data.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: See How SafeBreach Helps Validate Your Security Controls and Reduce Cyber Risk
  • Live at: May 13 2021 8:45 pm
  • Presented by: SafeBreach
  • From:
Your email has been sent.
or close