Battling Lateral Movement, Counter Incident Response & Island Hopping

According to the world’s top incident response (IR) professionals, cyberattackers are honing their ability to remain undetected inside the enterprises they’ve breached and evolving their attacks to counter defenders’ response efforts. Most organizations are unprepared to combat such attacks. Join Carbon Black’s Chief Cybersecurity Officer, Tom Kellermann, and Security Strategist, Rick McElroy, as they review and discuss the latest findings from Carbon Black’s Quarterly Incident Response Threat Report (QIRTR), including.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

A DNS Security Architecture as SecOps Force Multiplier

The Domain Name System (DNS) is essentially the central nervous system of the internet—everyone needs it to work because without DNS services, digital business would come to a halt. Cybercriminals know this, too, and use DNS services to launch their attacks while they simultaneously attack the DNS services of their targets.
Watch Now

Creating a Modern Identity Strategy for Hybrid IT Environments

| Sponsored

The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-time deployments and the hardware, softwa
Watch Now

Leveraging Analytics for More Effective Security Performance

BitSight

More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off — and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to your organization? Security ratings and the analytics they provide give businesses a unique insight into their organization's security performance and posture in relation to their peer group.
Watch Now

Shifting Security Left with env0

Infrastructure and application deployment automation is not new. Tools like CI/CD pipelines and more have been around for a while. But what happens when you need to add in other operational tasks? Checking budget, checking performance, checking security. All of these things are very important to the business and should not be an afterthought. In this webinar, we will talk about shifting security left in your Infrastructure as Code Automation workflows. We'll be joined by Sean O'Dell, Director of DevRel at Accurics. We'll integrate Terrascan into a workflow, and show the power of dealing with security in each and every deployment or update.
Watch Now