This presentation will focus on cutting edge training technologies and strategies for security team managers and cyber-pros that will help to overcome limited budgets and time, as well as train in place requirements.
Companies also are being more aggressive about ensuring their supply chains are safe and using threat intelligence to reduce the number of known attack vulnerabilities. What are you doing to protect your network in advance, and how do you sell these proactive programs to your C-Suite
The Security Operation Center or SOC has historically played the important role as the ‘command and control’ hub for an organization’s cyber security efforts. However, the reactive SOC of yester-year cannot keep up with today’s advanced adversaries and is failing to keep organizations safe from unknown cyber threats. This must change.
We've covered common cyberattacks - like spear phishing, island hopping, and ransomware - in previous webinars, but now it's time to pull together a layered defense strategy. Understanding why and how attacks happen in the first place becomes integral in protecting your systems and your data.
This webinar will throw attendees into an emerging breach simulation. Delegates will be collectively in control of how a fictional company reacts to technical, business, and risk challenges in near real-time, making decisions using their mobile devices in response to the evolving scenario. The elements of this scenario will use examples from recent breaches and highlight potential missteps made by those organizations.
Threat Hunting and Detection: Locating and isolating threat actors in your network February 23 & 24, 2021 10:30 am – 4:00 pm EDT Many cybersecurity solutions leave security organizations playing a reactive cat-and-mouse game — one in which cybercriminals always seem to have the edge. Refining your threat hunting and detection capabilities is essential to shifting your strategy to a proactive stance.