3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

Infocyte

In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
Watch Now

Spotlight

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

OTHER ON-DEMAND WEBINARS

How to Secure Your Applications Against API Attacks

Application programming interfaces (APIs) are the basic building blocks to enabling business applications and software to communicate and share data. Therefore, cyber-attacks targeting APIs can be a major headache to businesses, potentially leading to large-scale data breaches as well as causing massive disruption. Yet, API security has never been more broken, with security teams unprepared for surging levels of attacks targeting these software intermediaries. In this webinar, a panel of experts will review the state of API cybersecurity and provide insights into how to protect these interfaces from an increasingly high volume of attacks. Join this session to learn:
Watch Now

Strengthening Industrial Cybersecurity with Internal Segmentation

This session shares recent changes in the ICS cyber threat landscape and introduces EdgeIPS™ Pro, developed by TXOne Networks to provide ICS network segmentation, trust lists, and virtual patch technology to make up the new cybersecurity foundations of your shop floor network.
Watch Now

Security, Privacy, and Compliance in 2023: Predictions, Expectations, and Preparations for Data Management in a Post-Pandemic Environment

Learn what the results of the 2022 eDiscovery Unfiltered report indicate about the direction of data management over the next 12 months and how your legal team can navigate current and future security, privacy, and compliance challenges in its approach from a panel of leaders including Marla Crawford, general counsel of Cimplifi, and Paul Lewis, chief executive officer of Calamu in a discussion moderated by industry analyst, Ari Kaplan.
Watch Now

5 steps every charity should take to improve their cyber security

NCSC

On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their organisation. In this session, we’ll look at the simple, free or low cost steps every charity should be taking to protect themselves online.
Watch Now

Spotlight

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

resources