ATT&CK Deep Dive: Lateral Movement

Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your security program.
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

OTHER ON-DEMAND WEBINARS

Under the Radar – The Future of Undetected Malware

Malwarebytes

The future is not full of easy to detect junkware, but hard to remediate and dangerous malware. Cybercriminals are becoming more sophisticated and adopting anti-forensic techniques that evade defenses with hard to remediate malware, like fileless attacks. Watch our webinar and learn about: The future of undetected malware. The latest and hardiest threats to remediate like Sam Sam, Sorebrect, Emotet and TrickBot. How prominent cybersecurity vendors cannot protect you from these threats.
Watch Now

Stage 2 – Protection: The second layer of your cyber defence-in-depth strategy

Protecting an organization from the increasing threat of cyber attacks can be challenging. Employees are a crucial line of defense, and ensuring they know their security responsibilities and how to spot a cyber attack is critical.
Watch Now

Best Practices for Assessing Cyber Vulnerabilities

Tenable

Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimated nearly 19,000 new vulnerabilities would be disclosed. There are just too many to discover, assess and effectively mitigate. Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Bill Olson, Technical Director with Tenable, for an on-demand webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.
Watch Now

THE CYBERSECURITY CHALLENGE IN CEE - KEY REPORT FINDINGS

CMS

We will be hosting a live webinar on Monday 10 December 2018 at 4pm CET to discuss some of the key findings in the report. Moderated by John Malpas, Publishing Director at Legal Week, the panel will be joined by Andrea Simandy, European Data Protection Attorney at Microsoft, Dora Petranyi, CEE Managing Director at CMS and Dominic Carman, Writer and Consultant, who worked with the Legal Week Intelligence team on the research and writing for the report.
Watch Now

Spotlight

Reducing the operational risks of IT/OT connectivity entails a different number of challenges, like building threat detection capabilities for OT environment without causing operational risks, or understanding security events, their impact on OT environments and focus on what really matters. Adding to this, the general lack of r

resources