Webcasts

May
25
2:00 PM ET
Cybercast
The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, companies are also taking steps toward securing their supply chains. And they are now facing many of the same struggles that government bodies have endured while attempting to adhere to the executive orde...
May
Cybercast
The executive order issued by the White House last year calls for more robust software supply chain protections for federal agencies. Meanwhile, companies are also taking steps toward securing their supply chains. And they are now facing many of the same struggles that government bodies have endured while attempting to adhere to the executive orde...
June
Cybercast
The average dwell time of a network intrusion lasts an average of 197 days before discovery, according to a Ponemon Institute study. During that window, there are key moments where the attackers take an action that might alert you to their presence. If you notice it, then you can mitigate the attack before it’s too late. But uncovering these indic...
Cybercast
You’ve completed a pen test and, not surprisingly, the offensive security exercise turned up multiple weak points and exploitable vulnerabilities across your enterprise environment.  Now what? How do you do ensure your pen test results are actionable and that you get the support from leadership to act on the findings? How do you assess the...
Cybercast
Security practitioners have many different initiatives demanding their time: evaluating and mitigating 3rd party risk, enabling strategic business efforts, implementing zero-trust practices, and supporting compliance activities, to name just a few. Often overlooked in these initiatives is a security gap that is critical to close if any of these in...
Cybercast
The SolarWinds and Kaseya attacks. Log4Shell and ProxyShell… These are the headlines that give security professionals nightmares. To survive the dizzying pace of today’s modern threat landscape, organizations must have in place an action plan that allows them to quickly triage security incidents, with the confidence that they’re responding t...
Democast
Timely threat detection is essential. Every second that a malicious actor lingers inside your network, the odds increase that your organization could be the victim of a major malware attack. Nation-state APT actors are especially adept at staying hidden – but if you know what TTPs and IOCs to look for and you have comprehensive visibility into the...
Cybercast
When it comes to developing strong security hygiene habits, it’s easy to talk a big game. But consistently executing on these practices is another ballgame entirely. Even the simplest of tasks can become unwieldly as a company’s IT assets scale in size. Nevertheless, businesses can take significant strides in bolstering their cyber hygiene against...
Cybercast
As more organizations adopt multi-cloud strategies, security managers must develop a strategy to consistently protect web applications across hybrid environments, while preserving quality of security and operational efficiency. The traditional approach to application security no longer works in the multi-cloud, and anew approach is needed. Join us...
Cybercast
Ransomware actors are always evolving their techniques. This is especially true now, considering the increased use of legitimate applications and LOLBins (Living off the Land binaries.), combined with the recent emergence of major exploits such as Log4Shell, ProxyLogon and PrintNightmare. Join this session to learn about the latest procedures atta...
Democast
In today’s distributed environment where new threat vectors and vulnerabilities emerge daily, it’s no longer sufficient to prioritize remediation based on a CVSS score. Tanium brings together numerous sources of risk (e.g. vulnerabilities, compliance gaps, sensitive data exposure, and excessive administrative rights) and combines that with the cri...
Cybercast
Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, built-in ability to prioritize alerts based on the risk level specific to an organization’s business. VDR automatically performs asset and service discovery, d...
Cybercast
How do you build trust without boundaries? With multi-cloud and remote work policies taking hold, security focus has shifted from protecting the perimeter to securing everything using trusted identities. In this new reality, public key infrastructure (PKI) is an essential building block.There’s just one problem – most PKI deployments are sorely ou...
Cybercast
The notion of “shifting left” refers to organizations conducting security testing earlier in a standard linear development process. But there’s a catch: Modern DevSecOps is very much not linear — as there should be robust testing in both staging and production environments. Indeed, to execute DevSecOps properly, security...
Cybercast
Which authentication methods should we use? This is one of the most common questions you’ll need to address as you roll out multi-factor authentication (MFA) across your organization. It’s critical to build a holistic MFA strategy that utilizes the right methods in the right places. While traditional MFA methods such as phone-based or har...
Cybercast
Cloud service platforms, like AWS, make infrastructure deployment easier for developers. In practice, organizations tend to expose their instances on the cloud network far more than is actually necessary. Unit 42 Threat Researchers analyzed hundreds of public cloud accounts during the pandemic and found a 68% increase in instances directly exposed...
Cybercast
It can be tough deciding how much automation you want to introduce into a particular IT security function. While automation does bring speed and efficiency, companies sometimes like to rely on human judgment for important security decisions. This debate is certainly true for third-party risk management, as companies debate if they want to use auto...
Cybercast
Ransomware has captured the attention of many due to its far-reaching impacts on industrial control systems. Once an issue that affected IT infrastructure only, now ransomware can target control processing, logistics, distribution, and delivery of critical goods. Ransomware adversaries employ criminal behavior and ransomware groups disappear an...
Cybercast
Zero trust is an approach to security that moves defenses from statically defined network perimeters to explicitly identified assets and users. The transition to zero trust is a journey, not a product—and most organizations already have many elements of a zero trust architecture in their enterprise today. By incrementally adopting and implementing...
Cybercast
Despite the hype around Zero Trust, many organizations still struggle to implement it, according to responses to a CyberRisk Alliance Business Intelligence survey. Of the 300 IT security professionals who responded, only 35% are familiar with the principles of Zero Trust and only 36% have implemented it. But they plan to push forward in the coming...
Cybercast
Cybercriminals may have launched a few less DDoS attacks in 2021, but after the extraordinary rise during the pandemic, the attacks (still 14% more than pre-pandemic) continue to evolve with new strategies for disrupting networks and extorting targets. Adversaries continue to evolve in parallel to defenders making it just as, or more difficult tha...
Cybercast
Software engineers and code developers face a unique set of password management challenges that can put organizational secrets in danger. Technical teams must take care to avoid embedding credentials, SSH keys, DevOps secrets and other confidential secrets into their code. Moreover, these workers can potentially risk leakage of secrets when employ...
Cybercast
These days, improving security is fraught with challenges. Your attack surface keeps changing. You likely have vulnerabilities hiding in assets you don’t even know exist. And convincing people to remediate vulnerabilities after you identify them is harder than it should be – oftentimes, they won’t even admit there’s a problem!  In our up...
Cybercast
As ransomware attacks become increasingly targeted and damaging, infected businesses run the risk of having their data held hostage and their network operations disrupted for days or even weeks. The danger has never been more real – and there are no more excuses: Organizations must understand the core fundamentals of ransomware prevention, respons...
Cybercast
The process of signing up a new customer has opposing objectives at play. On one hand, you want to ensure the account sign-up process is quick and painless for legitimate users. But you also want to have enough safeguards in place to weed out fraudsters, identity thieves, and bots who attempt to create fake accounts to cause financial and reputati...
Cybercast
How do you manage your security portfolio? Do you use regulatory frameworks as a basis? As a target? Experience shows that these frameworks are an important starting-off point but should not be considered the targeted end-state. How confident are you that your controls will function correctly during a real attack? Time and time again, we see th...
Cybercast
4.5 million people have quit their jobs during the pandemic1. It’s the reason why 73% of CEOs surveyed cite labor and skills shortages as their top concern in 20222. Businesses are turning to third-party workers to fill the talent gap – and these users often need the same access to systems and data as regular employees. Whether the third par...
Democast
When it comes to reacting to a security threat, no one has time for another assessment. Join CyberGRX experts Gary Phipps, VP of Solutions Engineering, to learn how you and your third parties can defend yourself differently in the face of a cyber attack. We’ll talk about a new way to respond that includes: What proactive steps a third ...
Cybercast
Ransomware is a big business. Attacks are becoming more sophisticated, and extortion is the name of the game when it comes to extracting payments from targets. These types of threats, combined with increased supply chain vulnerabilities, require a more proactive approach to securing your organization. To stay ahead of these attacks, security admin...
Democast
Data Staging and Data Exfiltration are common activities used in today’s ransomware playbooks. Data Staging is a combination of locating the data the attackers want to exfiltrate and then bringing all the parts together into a single repository. Data Exfiltration involves disguising the activities to steal confidential data out of the organi...
Cybercast
To establish an effective and proactive cloud security program, you need a plan to operationalize across your environment, while taking advantage of all the efficiencies and methodologies that make your security team’s job more manageable. But to truly inspire company-wide confidence in your approach, security leaders also need to know what they a...
Cybercast
The change in workforce dynamics caused by the pandemic and inability to stop attack campaigns requires drastic improvements to how Security Operations Centers (SOCs) function. Many user organizations must contend with a lack of quality of data, superior analytics and confidence in automation — leaving security teams to struggle. How can more than...
Cybercast
We live in a world where the question is no longer whether your company will experience a data breach, but when. Hardly a day goes by that you don’t hear about a major data breach or a new cyberattack that’s making headlines—and the costs associated with these security events continue to mount. One solution is isolation technology rooted in Zero T...
Cybercast
APIs are the great connectors. API communications now make up more than 80% of Internet traffic and Gartner predicts that they will become the most frequent attack vector this year. Yet APIs are often overlooked in web application security programs. It’s not surprising that attackers are taking advantage of this gap and increasingly targeting web ...
Cybercast
90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Based on research conducted by VMware’s Threat Analysis Unit, this webcast uncovers th...
Cybercast
In 2021, Gartner identified Cloud Native Application Protection Platforms (CNAPPs) as a new category that combines CSPM, CWPP, KSPM, and CIEM in one platform. CNAPPs have full coverage and visibility into cloud estates and can detect risks across the technological stack, including cloud configuration, workload and identity. In this webcast, Marcel...
Cybercast
Third-party relationships have expanded exponentially as companies seek outsourced services and software to perform optimally and backfill talent amid the ongoing pandemic. That expansion has broadened attack surfaces as threat actors target weaker vendors with strong market penetration to quietly surveil and paralyze systems. For security teams t...
Webcast
With security threats continuously mounting and the threat landscape evolving at record speeds, organizations continue to seek the guidance of Managed Security Service Providers (MSSPs). Why do these firms leverage MSSPs and what are the benefits of these investments? In this session, we’ll break down how MSSPs help to address challenges with: ...
Democast
Within the MITRE ATT&CK framework, which attacks would you miss by not fully decrypting traffic?  Can fully decrypted traffic help detect attacks sooner? This webcast explores how to use decryption to more accurately detect malicious activity and defend against it. Speakers: Jamie MolesSenior Technical Marketing ManagerExtraHopJamie...
Cybercast
In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure as code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure are. Often security is underrepresented in this formula an...
Cybercast
The true potential of the cloud is often hindered by security controls that weren’t purpose-built for dynamic, microservice architectures or the shared security and compliance responsibility common to cloud providers. Zero Trust security helps organizations harden their defenses and empower their enterprise with accelerated transformation initiati...
Democast
Microsoft Active Directory (AD) is a target-rich environment for malicious actors. Attackers hone in on it because it’s widely used and remains backward compatible with many versions of Microsoft Windows and Server environments. This webcast explores the specific techniques they use (DoublePulsar, for example) and how to defend against it vi...
Webcast
You’ve been hearing it every January for the last decade: The coming year will see a continued escalation of ransomware attacks. But these past 12 months have been different. Ransomware gangs took their attacks to a dangerous new level, targeting ubiquitous software used by business, government agencies and critical infrastructure and rev...
Cybercast
Today’s approach to defense in depth for application security are siloed, lack context, and results have fallen short. But a layered approach is the key to building a world-class AppSec program that spans the entire Software Development Lifecycle (SDLC). So, how does our approach need to change? In this webinar, you’ll hear from three exp...
Cybercast
Security has long been seen as the “department of no”, known for phrases like, “You can’t do that”, and “You can’t use that application.” But what if we told you that this mindset could change in an instant? That and security could be the business enabler it was meant to be?  Join “Securi...
Democast
With 1Password Business, your team can securely store and share passwords, infrastructure secrets, and other sensitive information – helping protect your organization’s most vulnerable data. Join us for an upcoming 1Password Business Demo to learn the platform’s many features, how to use it both effectively and safely, and how to maximize both sec...
Cybercast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. Those are among the findings from a survey CyberRisk Alliance conducted among InfraGard’s 77,000-plus membership, which includes organizations in the financi...
Cybercast
Salesforce provides business-critical services for organizations interfacing with a vast matrix of suppliers, vendors, partners and customers. Unfortunately, the more connected the organization, the more appealing it is cyber criminals looking to gain access to these companies’ data and networks, and they’re targeting the Salesforce platform to do...
Cybercast
Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your risk of becoming their next victim. Speakers: G...
Cybercast
With the rapidly accelerating move to cloud computing and the use of SaaS applications, organizations are struggling with legacy technologies like VPN, CASB, and “Legacy” MFA solutions that are either not secure enough, not easy enough for end users or both. What is emerging is modern, fundamentally strong multi-factor authentication that is enabl...
Cybercast
You’ve developed an app, applied in-app protection, pen-tested it, then published it. But the need for mobile app security doesn’t stop once it’s released into the wild. This webinar will explore the role real-time threat monitoring plays in the constantly evolving app security landscape and how it can help you strengthen your mobile app security....
Webcast
Unmanaged endpoints like IoT devices represent a significant and growing risk surface. Network Detection and Response (NDR) solutions monitor network traffic to generate rich security evidence that enables asset inventory, vulnerability assessment and threat monitoring. In this presentation, experts from Corelight and Microsoft will walk you throu...
Webcast
The goal of SecOps teams is to monitor, detect, investigate, and respond to suspicious activity and events. Often, this leaves these teams in a reactive state, with minimal opportunity to reduce false-positives and innovate. One key aspect of innovative, mature SecOps programs? Their ability to gather context from data sources to inform investigat...
Webcast
When it comes to detecting the next cyber breach, would your organization pass the test? SE Labs recently conducted the industry’s first network detection and response (NDR) test against NSX NDR using a range of advanced persistent threats designed to compromise systems and penetrate target networks. Join two VMware experts: Lead Cybersecurity...
Webcast
Securing who has access to what, when and under the right conditions is foundational to any mature network security strategy. Learn how to augment and replace failing legacy security controls with Zero Trust Network Access (ZTNA), a proven and effective solution that minimizes risk AND simplifies operations. In this webcast, Jim Anthony will demon...
Webcast
The noise about eXtended Detection and Response (XDR) focuses too much on the market and vendors and not enough on problems security teams must solve. This webcast panel discussion among industry experts will focus on three of the most pressing cybersecurity challenges, why they are hard to solve, and how the right approach to XDR might actually m...
Webcast
The pandemic illustrated the need for security operations that can function from anywhere. But a lot of orgs don’t have the resources to build this capability in-house and are turning to managed detection and response (MDR) providers for help. One of these providers is Expel — positioned as a leader by Forrester in a recent head-to-head eval...
Webcast
As more sensitive workloads and data continue to migrate to the cloud, cyber criminals and malicious actors are refocusing and sharpening their efforts to locate and attack them. Bad actors have discovered that they too can leverage the power of the cloud by compromising cloud applications and assets with malware and Trojans. After establishing a ...
Webcast
With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.  Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challenges and minimize stress in your high-pressure job....
Webcast
As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services and software, there’s one certainty we can rely on (thanks to the second law of thermodynamics): things will only get more complex. But there’s good news.  What we previously thought of as “asset management” has evolved. T...
Webcast
When ransomware gangs attack, organizations’ recovery efforts are often complicated by a lack of process and procedures, limited resources and a general lack of crisis management planning. That, according to a survey of InfraGard’s 77,000-plus membership, which includes organizations in the defense/industrial base, commercial facilities, financial...
Webcast
Security teams know the key to catching and stopping attacks early is to understand how their adversaries think. But many are behind the curve, according to a recent survey (conducted by CyberRisk Alliance and sponsored by PlexTrac) among 315 security influencers and decision makers in the U.S. and Canada. When it comes to stopping ransomware a...
Webcast
APIs sit at the heart of modern application development, connecting vital data and services. Hackers understand this reality and are increasingly targeting APIs. Existing security tooling cannot detect or stop today’s sophisticated API attacks.  In this webinar, you’ll learn steps you can take right now to reduce your API attack surface....
Webcast
Today, the web browser is likely everyone’s most-used application. But with users online more than ever and constantly executing unknown, untrusted code, the browser also represents one of an organization’s largest attack surfaces.  Browser isolation solutions execute all browser code in the cloud — far away from local devices. That ...
Webcast
In May, June, and July 2021, MIT Technology Review Insights, in association with Palo Alto Networks, surveyed senior executives with technology decision-making responsibilities across Asia-Pacific, Europe, the Middle East, Africa, and North America. The research seeks to understand what organizations across the globe are doing to understand and co...
Webcast
When it comes to security, deciding where to dedicate resources is vital. It’s critical to know what security issues are most likely to crop up within your organization and their potential impacts. The challenge is that the most active threats change over time as the prevalence of different attacks ebb and flow. Tune in to this webcast to learn...
Webcast
A new survey of over 1,000 security leaders shows organizations are making strides to improve their security posture but are missing the foundational capabilities needed to realize them. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational inefficiencies and the lack of full visibility. How are se...
Webcast
With the proliferation of cloud, IoT, SaaS and agile everything, today’s IT environments are incredibly dynamic — and under constant attack. Traditional solutions weren’t built for these modern attack surfaces, missing critical exposures and overlooking attack-chain steppingstones, while inundating security pros with false positives. As a result, ...
Webcast
Given the spate of software supply chain attacks, organizations need to do more to understand and correct development and build process vulnerabilities. The recent SolarWinds and Kaseya attacks have helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact most organizations today. Modern, agile developme...
Webcast
While it had always been business-critical, email became even more crucial as the COVID pandemic forced organization to adopt new business procedures rapidly. This is evident in Area 1 Security’s new study, “It Started Out with a Phish,” which analyzes over 31 million threats across multiple organizations and industries. This session will highligh...
Webcast
With the prolific amount of ransomware attacks in the news lately, it’s understandable that you might be concerned about your organization’s level of protection against outside threats and bad actors. The accelerated adoption of digital transformation initiatives that rapidly drove both data and applications to the cloud over the past year resulte...
Cybercast
Cybercriminals have added a devious weapon to their attack arsenals — malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop-ups can wreak havoc on your network while remaining completely undetected. They look more realistic than traditional phishing methods and are desi...
Webcast
Users need access to data and applications, but do they need it all the time? Just as manufacturing saw a sea change with just-in-time component delivery, security teams can develop policies and procedures for just-in-time access for users who need data by validating and verifying devices before access is granted. This webcast looks at how con...
Webcast
The vendor landscape for cloud security and compliance solutions is crowded, diverse and confusing. John Alexander, Director of Technical Product Marketing at Orca breaks down the vendor landscape, drawing on Orca and Analyst research, including Gartner’s recent Cool Vendors in Cloud Security Posture Management. Then see how, from a single SaaS...
Webcast
Every organization is unique when it comes to cybersecurity, with a specific set of requirements, budget, technologies and headcount that varies for every team. Finding a true security partner that will tailor its services to your exact needs can mean the difference between early detection and mitigation or being another number in a queue with mor...
Cybercast
Today’s networks are expanding beyond on-prem to include cloud and hybrid deployments. While enterprises seek to balance agility and security, they are also faced with skills shortages and the need to work with the technology of multiple vendors. Automation is key to addressing these challenges while offering cloud, network and security teams the ...
Cybercast
We’ve moved away from having discrete access controls associated with each of our datacenter services to leveraging the public cloud where we issue credentials with full administrative power across all cloud capabilities, including virtual machines, containers, networking, DNS, storage buckets, long-term archived storage and often much more....
Webcast
Adversaries are much faster at finding vulnerable assets to attack than defenders are at finding those same assets to secure. To help enterprises gain ground in this battle, the Palo Alto Networks Cortex Xpanse research team studied the public-facing internet attack surface of some of the world’s largest businesses. In this webcast, Palo Alto N...
Webcast
In the new Round 3 MITRE ATT&CK Evaluation, Cortex XDR was evaluated against attack tactics and techniques that have been leveraged by the threat actor groups Carbanak and FIN7. This evaluation involved two complete attack scenarios, modeled against real-world sophisticated attacks targeted at financial institutions. We’ve put together an expe...
Webcast
When Cortex XDR was launched in 2019 by Palo Alto Networks as a solution to a siloed detection and response market, no one could anticipate the speed at which Extended Detection and Response (XDR) would proliferate across security operation centers globally. Join Josh Zelonis, Field CTO and Evangelist at Palo Alto Networks as he takes attendees...
Person to Person
Threats don’t come only from external sources; data exposure events caused by insiders can often be more destructive. Malicious insider attacks unquestionably have a damaging impact on organizations, but non-malicious insider incidents occur every day – when users with legitimate access are involved in unintentional data loss or exposure – and can...
Webcast
Software developers are tasked with developing and releasing software at breakneck speed, while security teams must have visibility into every workload that debuts to measure risk. Cloud security teams can’t be autonomous as they depend on developers to install security agents to give them that very workload visibility. What’s more? Se...
Webcast
Phishing today is as dangerous and prevalent as it’s ever been, often saddling organizations with ransomware attacks and destructive and dangerous malware infestations. Fortunately, through a combination of threat intelligence, threat hunting, managed phishing and threat detection services and employee training, companies and their security teams ...
Person to Person
Perimeter security likely will not be enough to secure the networks of the future. Today’s perimeter is more like tentacles that reach out far beyond the borders of the corporate network and cloud and into your partners’ networks, kiosks and mobile devices. So how do you protect your data at rest, in transit or in use? Zero trust is an option, but...
Person to Person
If you’d like to hear how security pros are responding and adapting to increased attacks and breaches — including facilitating more comprehensive cyber threat management strategies and best practices and increasing investments and utilization of resources — join the discussion of our panel experts. The Cybersecurity Resource Alloca...
Webcast
The demand for automation in vulnerability discovery increases with the number of lines of code released every minute. The ability to identify vulnerabilities in source code comprehensively, efficiently, and with few false positives is an important primitive to achieve this. In this session, see how we demonstrate success in these areas, includ...
Webcast
Supply chain hacks rose 42% in Q1 2021 compared to the prior quarter, and nearly 140 organizations reported being impacted by supply chain attacks in Q1, according to the Identity Theft Resource Center. If attackers’ success in executing supply chain attacks, business email compromise, and financial fraud are dependent on exploiting your partne...
Democast
Are you using agents, network scanners, or CSPM tools to detect risks across your public cloud estate? If so, there’s a better way. Delivered as SaaS, Orca’s SideScanning technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you cloud-wide, workload-deep security and compliance for AWS, Azure and GCP &#...
Webcast
In a hybrid world, the ability to identify and stop a threat before it becomes a breach is an uphill battle. Many organizations struggle to maintain proactive security. Managed Detection and Response (MDR) services can help alleviate these burdens while ensuring a proactive, robust security posture. Join Trustwave in this session to learn more ...
Webcast
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested ove...