Webcasts

February
15
2:00 PM ET
Democast
Within the MITRE ATT&CK framework, which attacks would you miss by not fully decrypting traffic?  Can fully decrypted traffic help detect attacks sooner? This webcast explores how to use decryption to more accurately detect malicious activity and defend against it. Speakers: Jamie MolesSenior Technical Marketing ManagerExtraHopJamie...
February
Webcast
With security threats continuously mounting and the threat landscape evolving at record speeds, organizations continue to seek the guidance of Managed Security Service Providers (MSSPs). Why do these firms leverage MSSPs and what are the benefits of these investments? In this session, we’ll break down how MSSPs help to address challenges with: ...
Cybercast
Third-party relationships have expanded exponentially as companies seek outsourced services and software to perform optimally and backfill talent amid the ongoing pandemic. That expansion has broadened attack surfaces as threat actors target weaker vendors with strong market penetration to quietly surveil and paralyze systems. For security teams t...
Cybercast
In 2021, Gartner identified Cloud Native Application Protection Platforms (CNAPPs) as a new category that combines CSPM, CWPP, KSPM, and CIEM in one platform. CNAPPs have full coverage and visibility into cloud estates and can detect risks across the technological stack, including cloud configuration, workload and identity. In this webcast, Marcel...
Cybercast
90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that Linux-based malware is propagating in multi-cloud environments under the radar? Based on research conducted by VMware’s Threat Analysis Unit, this report...
March
Cybercast
APIs are the great connectors. API communications now make up more than 80% of Internet traffic and Gartner predicts that they will become the most frequent attack vector this year. Yet APIs are often overlooked in web application security programs. It’s not surprising that attackers are taking advantage of this gap and increasingly targeting web ...
Cybercast
In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure as code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure are. Often security is underrepresented in this formula an...
Cybercast
The true potential of the cloud is often hindered by security controls that weren’t purpose-built for dynamic, microservice architectures or the shared security and compliance responsibility common to cloud providers. Zero Trust security helps organizations harden their defenses and empower their enterprise with accelerated transformation initiati...
Democast
Microsoft Active Directory (AD) is a target-rich environment for malicious actors. Attackers hone in on it because it’s widely used and remains backward compatible with many versions of Microsoft Windows and Server environments. This webcast explores the specific techniques they use (DoublePulsar, for example) and how to defend against it vi...
Webcast
You’ve been hearing it every January for the last decade: The coming year will see a continued escalation of ransomware attacks. But these past 12 months have been different. Ransomware gangs took their attacks to a dangerous new level, targeting ubiquitous software used by business, government agencies and critical infrastructure and rev...
Cybercast
Today’s approach to defense in depth for application security are siloed, lack context, and results have fallen short. But a layered approach is the key to building a world-class AppSec program that spans the entire Software Development Lifecycle (SDLC). So, how does our approach need to change? In this webinar, you’ll hear from three exp...
Cybercast
Security has long been seen as the “department of no”, known for phrases like, “You can’t do that”, and “You can’t use that application.” But what if we told you that this mindset could change in an instant? That and security could be the business enabler it was meant to be?  Join “Securi...
Democast
With 1Password Business, your team can securely store and share passwords, infrastructure secrets, and other sensitive information – helping protect your organization’s most vulnerable data. Join us for an upcoming 1Password Business Demo to learn the platform’s many features, how to use it both effectively and safely, and how to maximize both sec...
Cybercast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. Those are among the findings from a survey CyberRisk Alliance conducted among InfraGard’s 77,000-plus membership, which includes organizations in the financi...
Cybercast
Salesforce provides business-critical services for organizations interfacing with a vast matrix of suppliers, vendors, partners and customers. Unfortunately, the more connected the organization, the more appealing it is cyber criminals looking to gain access to these companies’ data and networks, and they’re targeting the Salesforce platform to do...
Cybercast
Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your risk of becoming their next victim. Speakers: G...
Cybercast
With the rapidly accelerating move to cloud computing and the use of SaaS applications, organizations are struggling with legacy technologies like VPN, CASB, and “Legacy” MFA solutions that are either not secure enough, not easy enough for end users or both. What is emerging is modern, fundamentally strong multi-factor authentication that is enabl...
Cybercast
You’ve developed an app, applied in-app protection, pen-tested it, then published it. But the need for mobile app security doesn’t stop once it’s released into the wild. This webinar will explore the role real-time threat monitoring plays in the constantly evolving app security landscape and how it can help you strengthen your mobile app security....
Webcast
Unmanaged endpoints like IoT devices represent a significant and growing risk surface. Network Detection and Response (NDR) solutions monitor network traffic to generate rich security evidence that enables asset inventory, vulnerability assessment and threat monitoring. In this presentation, experts from Corelight and Microsoft will walk you throu...
Webcast
The goal of SecOps teams is to monitor, detect, investigate, and respond to suspicious activity and events. Often, this leaves these teams in a reactive state, with minimal opportunity to reduce false-positives and innovate. One key aspect of innovative, mature SecOps programs? Their ability to gather context from data sources to inform investigat...
Webcast
When it comes to detecting the next cyber breach, would your organization pass the test? SE Labs recently conducted the industry’s first network detection and response (NDR) test against NSX NDR using a range of advanced persistent threats designed to compromise systems and penetrate target networks. Join two VMware experts: Lead Cybersecurity...
Webcast
Securing who has access to what, when and under the right conditions is foundational to any mature network security strategy. Learn how to augment and replace failing legacy security controls with Zero Trust Network Access (ZTNA), a proven and effective solution that minimizes risk AND simplifies operations. In this webcast, Jim Anthony will demon...
Webcast
The noise about eXtended Detection and Response (XDR) focuses too much on the market and vendors and not enough on problems security teams must solve. This webcast panel discussion among industry experts will focus on three of the most pressing cybersecurity challenges, why they are hard to solve, and how the right approach to XDR might actually m...
Webcast
The pandemic illustrated the need for security operations that can function from anywhere. But a lot of orgs don’t have the resources to build this capability in-house and are turning to managed detection and response (MDR) providers for help. One of these providers is Expel — positioned as a leader by Forrester in a recent head-to-head eval...
Webcast
As more sensitive workloads and data continue to migrate to the cloud, cyber criminals and malicious actors are refocusing and sharpening their efforts to locate and attack them. Bad actors have discovered that they too can leverage the power of the cloud by compromising cloud applications and assets with malware and Trojans. After establishing a ...
Webcast
With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.  Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challenges and minimize stress in your high-pressure job....
Webcast
As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services and software, there’s one certainty we can rely on (thanks to the second law of thermodynamics): things will only get more complex. But there’s good news.  What we previously thought of as “asset management” has evolved. T...
Webcast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. That, according to a survey of InfraGard’s 77,000-plus membership, which includes organizations in the defense/industrial base, commercial facilities, financial...
Webcast
Security teams know the key to catching and stopping attacks early is to understand how their adversaries think. But many are behind the curve, according to a recent survey (conducted by CyberRisk Alliance and sponsored by PlexTrac) among 315 security influencers and decision makers in the U.S. and Canada. When it comes to stopping ransomware a...
Webcast
APIs sit at the heart of modern application development, connecting vital data and services. Hackers understand this reality and are increasingly targeting APIs. Existing security tooling cannot detect or stop today’s sophisticated API attacks.  In this webinar, you’ll learn steps you can take right now to reduce your API attack surface....
Webcast
Today, the web browser is likely everyone’s most-used application. But with users online more than ever and constantly executing unknown, untrusted code, the browser also represents one of an organization’s largest attack surfaces.  Browser isolation solutions execute all browser code in the cloud — far away from local devices. That ...
Webcast
In May, June, and July 2021, MIT Technology Review Insights, in association with Palo Alto Networks, surveyed senior executives with technology decision-making responsibilities across Asia-Pacific, Europe, the Middle East, Africa, and North America. The research seeks to understand what organizations across the globe are doing to understand and co...
Webcast
When it comes to security, deciding where to dedicate resources is vital. It’s critical to know what security issues are most likely to crop up within your organization and their potential impacts. The challenge is that the most active threats change over time as the prevalence of different attacks ebb and flow. Tune in to this webcast to learn...
Webcast
A new survey of over 1,000 security leaders shows organizations are making strides to improve their security posture but are missing the foundational capabilities needed to realize them. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational inefficiencies and the lack of full visibility. How are se...
Webcast
With the proliferation of cloud, IoT, SaaS and agile everything, today’s IT environments are incredibly dynamic — and under constant attack. Traditional solutions weren’t built for these modern attack surfaces, missing critical exposures and overlooking attack-chain steppingstones, while inundating security pros with false positives. As a result, ...
Webcast
Given the spate of software supply chain attacks, organizations need to do more to understand and correct development and build process vulnerabilities. The recent SolarWinds and Kaseya attacks have helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact most organizations today. Modern, agile developme...
Webcast
While it had always been business-critical, email became even more crucial as the COVID pandemic forced organization to adopt new business procedures rapidly. This is evident in Area 1 Security’s new study, “It Started Out with a Phish,” which analyzes over 31 million threats across multiple organizations and industries. This session will highligh...
Webcast
With the prolific amount of ransomware attacks in the news lately, it’s understandable that you might be concerned about your organization’s level of protection against outside threats and bad actors. The accelerated adoption of digital transformation initiatives that rapidly drove both data and applications to the cloud over the past year resulte...
Webcast
Mobile is an integral part of the customer experience organizations deliver, yet many assume mobile applications are not worth protecting because they don’t present material risk. This fallacy is perpetuated by a belief that the mobile platform (iOS or Android) provides a secure environment, or that the responsibility for security is on the ...
Cybercast
Cybercriminals have added a devious weapon to their attack arsenals — malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop-ups can wreak havoc on your network while remaining completely undetected. They look more realistic than traditional phishing methods and are desi...
Webcast
Users need access to data and applications, but do they need it all the time? Just as manufacturing saw a sea change with just-in-time component delivery, security teams can develop policies and procedures for just-in-time access for users who need data by validating and verifying devices before access is granted. This webcast looks at how con...
Webcast
The vendor landscape for cloud security and compliance solutions is crowded, diverse and confusing. John Alexander, Director of Technical Product Marketing at Orca breaks down the vendor landscape, drawing on Orca and Analyst research, including Gartner’s recent Cool Vendors in Cloud Security Posture Management. Then see how, from a single SaaS...
Webcast
Every organization is unique when it comes to cybersecurity, with a specific set of requirements, budget, technologies and headcount that varies for every team. Finding a true security partner that will tailor its services to your exact needs can mean the difference between early detection and mitigation or being another number in a queue with mor...
Webcast
DDoS attacks have dominated the charts in terms of frequency, sophistication and geo-distribution over the past year. Ransom DDoS attacks — that, unlike ransomware attacks, do not even require the hacker to access an organization’s internal systems before it can be carried out — are also surging lately. While there are no signs of DDoS attacks goi...
Cybercast
Today’s networks are expanding beyond on-prem to include cloud and hybrid deployments. While enterprises seek to balance agility and security, they are also faced with skills shortages and the need to work with the technology of multiple vendors. Automation is key to addressing these challenges while offering cloud, network and security teams the ...
Cybercast
We’ve moved away from having discrete access controls associated with each of our datacenter services to leveraging the public cloud where we issue credentials with full administrative power across all cloud capabilities, including virtual machines, containers, networking, DNS, storage buckets, long-term archived storage and often much more....
Webcast
Adversaries are much faster at finding vulnerable assets to attack than defenders are at finding those same assets to secure. To help enterprises gain ground in this battle, the Palo Alto Networks Cortex Xpanse research team studied the public-facing internet attack surface of some of the world’s largest businesses. In this webcast, Palo Alto N...
Webcast
In the new Round 3 MITRE ATT&CK Evaluation, Cortex XDR was evaluated against attack tactics and techniques that have been leveraged by the threat actor groups Carbanak and FIN7. This evaluation involved two complete attack scenarios, modeled against real-world sophisticated attacks targeted at financial institutions. We’ve put together an expe...
Webcast
When Cortex XDR was launched in 2019 by Palo Alto Networks as a solution to a siloed detection and response market, no one could anticipate the speed at which Extended Detection and Response (XDR) would proliferate across security operation centers globally. Join Josh Zelonis, Field CTO and Evangelist at Palo Alto Networks as he takes attendees...
Person to Person
Threats don’t come only from external sources; data exposure events caused by insiders can often be more destructive. Malicious insider attacks unquestionably have a damaging impact on organizations, but non-malicious insider incidents occur every day – when users with legitimate access are involved in unintentional data loss or exposure – and can...
Webcast
Software developers are tasked with developing and releasing software at breakneck speed, while security teams must have visibility into every workload that debuts to measure risk. Cloud security teams can’t be autonomous as they depend on developers to install security agents to give them that very workload visibility. What’s more? Se...
Webcast
Phishing today is as dangerous and prevalent as it’s ever been, often saddling organizations with ransomware attacks and destructive and dangerous malware infestations. Fortunately, through a combination of threat intelligence, threat hunting, managed phishing and threat detection services and employee training, companies and their security teams ...
Person to Person
Perimeter security likely will not be enough to secure the networks of the future. Today’s perimeter is more like tentacles that reach out far beyond the borders of the corporate network and cloud and into your partners’ networks, kiosks and mobile devices. So how do you protect your data at rest, in transit or in use? Zero trust is an option, but...
Person to Person
If you’d like to hear how security pros are responding and adapting to increased attacks and breaches — including facilitating more comprehensive cyber threat management strategies and best practices and increasing investments and utilization of resources — join the discussion of our panel experts. The Cybersecurity Resource Alloca...
Webcast
The demand for automation in vulnerability discovery increases with the number of lines of code released every minute. The ability to identify vulnerabilities in source code comprehensively, efficiently, and with few false positives is an important primitive to achieve this. In this session, see how we demonstrate success in these areas, includ...
Webcast
Supply chain hacks rose 42% in Q1 2021 compared to the prior quarter, and nearly 140 organizations reported being impacted by supply chain attacks in Q1, according to the Identity Theft Resource Center. If attackers’ success in executing supply chain attacks, business email compromise, and financial fraud are dependent on exploiting your partne...
Democast
Are you using agents, network scanners, or CSPM tools to detect risks across your public cloud estate? If so, there’s a better way. Delivered as SaaS, Orca’s SideScanning technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you cloud-wide, workload-deep security and compliance for AWS, Azure and GCP &#...
Webcast
In a hybrid world, the ability to identify and stop a threat before it becomes a breach is an uphill battle. Many organizations struggle to maintain proactive security. Managed Detection and Response (MDR) services can help alleviate these burdens while ensuring a proactive, robust security posture. Join Trustwave in this session to learn more ...
Webcast
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested ove...
Webcast
Every cybersecurity leader wants to ensure a secure, compliant and agile future, but knowing what to prioritize and when to make the right investments can be challenging. That’s why we recently surveyed more than 250 global IT security executives about their timeline and key drivers for five significant security investments: 1. Amping up automa...
Democast
Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to...
Democast
Controlling access to the cloud is one of the most critical security controls a company can take. The latest Verizon Data Breach Report tells us that one in every four attacks has been tied to a cloud data breach. This webcast will cover 5 cloud security best practices your organization can follow and how to minimize user friction in order to impl...
Democast
It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem ...
Webcast
AWS Fargate is a popular choice for running serverless containers, but runtime security is still a major challenge. Without access to the underlying host, visibility to threats is limited, leaving organizations blind to security risks. Detection and response often come with a lot of overhead or inaccuracies, leaving teams frustrated with the cover...
Webcast
There are at least as many ways to monitor and protect cloud workloads as there are types of cloud workloads that need protection. Since all security technologies have inherent advantages and drawbacks, organizations typically deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security profile,...
Webcast
If you are constantly chasing data as it moves around within the enterprise, to cloud and beyond, this webcast will show you how to implement a data-centric security strategy for your enterprise, quickly and easily. This one-hour session will focus on key advances in the areas of automation and artificial intelligence which have made large-scale d...
Democast
If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security tools, but each one...
Webcast
The distributed workforce is re-emphasizing the importance of endpoint security as a pillar of your security operations toolset. But if you are using a legacy endpoint protection platform that uses multiple consoles, it’s time to consider an upgrade. This webcast will share how you can quickly modernize your SOC, leave your legacy tools behind,...
Webcast
Ransomware operators are evolving their tactics, techniques, and procedures to become more difficult to detect. Recorded Future’s cyber threat analysts researched malicious actors using existing network applications (“living-off-the-land”) open-source resources, and red team tools, with a specific focus on “big game” ransomware operators. Th...
Webcast
Legacy security solutions are no longer capable of solving the challenges facing Security and IT teams today. Cybercrime is up 600 percent during the COVID-19 pandemic, as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased at...
Democast
Vulnerability management is far more comprehensive than simply installing plug-and-play threat modules. Rather, it’s a daily exercise in defense, detection, response, and mitigating risk. This webcast explores how vulnerability management works, how it integrates with other data security strategies, and why you should be concerned with managing an...
Webcast
The financial industry’s digital transformation efforts are under siege – going well beyond traditional account takeover. With payment card fraud, synthetic IDs, integrity attacks, and more, how can you best secure yourself and your organization? To help you, we’ve taken the pulse and perspectives of 126 bank CISOs with the fourth annual VMware Ca...
Democast
Threat hunting might seem out of reach, but all it truly takes is one curious person with direct access to the right data. The network, due to its breadth of visibility, offers an excellent starting point for your hunt. Traditional network logs, like Netflow, however, have left gaping blind spots on the network. That’s why many organizations are d...
Democast
It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem ...
Webcast
Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. Lots of scanning and vulnerability prioritization, but not a lot of actual remediation. Admittedly, moving from simple vulnerability management to deliberate vulnerability remediation isn’t easy. There are so many moving parts, with dozens ...
Democast
With fraud creativity exploding, due to the pandemic and one-third of user activity operating as high risk, companies are left to wrestle with how they tell their threat actors and users apart. Bringing trust to the digital environment is about laying out the red carpet for legitimate users but also understanding how the enemy behaves and changes ...
Webcast
For any organization, variability in third-party risk assessments can increase costs, impact efficiency, and cause frustration within the business. Reducing the impact of variability in third-party risk assessments is a challenge for most organizations. For many companies, volume of third-party risk assessments is driven by less predictable events...
Democast
Deploying and managing workloads and apps in private, public and hybrid clouds takes a village. What we once considered traditional IT has been replaced by a collective. IT Ops, DevOps and SecOps now team together to deliver and secure apps and services from the cloud. However, bolting on dozens of security products to your data center offers v...
Webcast
A recent research report from LogRhythm states a whopping 75 percent of security professionals have more stress now than they did two years ago. The report also found that 92 percent need additional preventative solutions to close security gaps, and 93 percent lack the tools they need to detect known security threats. Forrester joins us to disc...
Democast
IT ecosystems have become more sophisticated and so have attackers. Having a vulnerability risk management program that secures every layer of your modern environment including on-premises assets, cloud infrastructure, and web applications can substantially reduce your risk of attacks. Join us for a live demo of Rapid7’s InsightVM, our le...
Democast
If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security tools, but each one...
Webcast
How cloud native endpoint and workload protection will prepare you for the future: As the pandemic continues across the globe, cybercriminals grow more powerful and ransomware becomes big business, what can defenders expect in 2021?  In this webinar, cybersecurity strategists Greg Foss and Rick McElroy will share some key data from cybe...
Webcast
In a more and more digitized economy, enterprises have to take an in-depth look at their infrastructure and how to manage disparate teams that are swiftly becoming even more decentralized. Keeping those teams and the data they work with secure is as important today as ensuring operational efficiency, agility, and risk mitigation. Now, organization...
Webcast
At Snowflake, customer data is sacrosanct, and securing it has remained a top priority since its inception. Snowflake’s advanced data platform was born in and lives in the cloud and the company runs its business entirely in the cloud. Join this webcast and learn why Snowflake chose to go passwordless, how it got there, and what’s next as the t...
Webcast
Too many Security and IT teams know the challenge of establishing an efficient and effective remediation workflow. Mired by murky direction, unsupported priorities, and an insurmountable number of vulnerabilities to tackle, friction can develop between these teams that ultimately hinders security efficacy.  As companies transform their ope...
Webcast
Security and IT teams rank improved collaboration as a top priority for the coming year. However, it’s not always an easy path to create true collaboration between teams. 83 percent of respondents state that IT and Security Teams have a negative relationship, according to a recent Forrester study.  Security and IT teams moving to a more co...