ATT&CK Deep Dive: Lateral Movement

Carbon Black

Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your security program.
Watch Now

Spotlight

As a savvy IT director, you know it’s more challenging than ever to protect your enterprise against today’s evolving, sophisticated threats. And you are probably now looking at your security with a critical eye and the knowledge that traditional, signature-based antivirus by itself is a weak defense against the latest threats and targeted attacks.While many security vendors claim to have “the silver bullet” to solve all your security problems, the reality is that no single layer of security will protect against all the threats you face. You need a multi-layered security strategy, as outlined in Gartner Research’s “A Buyer’s Guide to Endpoint Protection Platforms”. However, there’s more to it than just having multiple layers of security. You need those layers to work together to provide an entire lifecycle of connected threat defense.

OTHER ON-DEMAND WEBINARS

Bringing New Meaning to Extended Detection and Response

For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).
Watch Now

How to Prioritize and Protect Against Relevant Threats: Context is the Key

ThreatConnect

Joint webinar featuring ThreatConnect and FireEye iSight Intelligence: “How to Prioritize and Protect Against Relevant Threats: Context is Key”. The webinar covers how to prioritize your team’s response and put your intelligence to use.
Watch Now

Defending against ransomware through comprehensive data lifecycle management

Don’t miss this insightful webinar on Data Lifecycle Management (DLM) solutions and discover how this comprehensive approach can defend your organization against the threats of ransomware
Watch Now

Hacker vs CISO: How to Exploit/Protect the WFH Workforce

A Former Hacker and a Current CISO Face Off In today’s world where entire workforces were forced to move to an entirely remote work environment overnight, IT security leaders are facing new cyber attacks every day. Not only have hackers and adversaries become more sophisticated over the past decades, the hastily distributed work
Watch Now

Spotlight

As a savvy IT director, you know it’s more challenging than ever to protect your enterprise against today’s evolving, sophisticated threats. And you are probably now looking at your security with a critical eye and the knowledge that traditional, signature-based antivirus by itself is a weak defense against the latest threats and targeted attacks.While many security vendors claim to have “the silver bullet” to solve all your security problems, the reality is that no single layer of security will protect against all the threats you face. You need a multi-layered security strategy, as outlined in Gartner Research’s “A Buyer’s Guide to Endpoint Protection Platforms”. However, there’s more to it than just having multiple layers of security. You need those layers to work together to provide an entire lifecycle of connected threat defense.

resources