ATTACK SIMULATION

Cybereason

This isn't your typical product demo or attack simulation. In this webinar, we’ll take a closer look at how to empower you — the defender — with Ai Hunting technology.  We'll start with the full view of a real-life cyber attack and then zoom in on the viewpoint of the defender. Witness the malicious operation from the defender’s view and learn how to gain the upper hand over the adversary with the power of automated threat hunting, using AI technology.
Watch Now

Spotlight

One of the greatest risks you will face in your Microsoft environment is Business Email Compromise. This attack costs organizations around the world millions in losses each year, with no signs of slowing down.

OTHER ON-DEMAND WEBINARS

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

Double Your Revenue with Backup and DRaaS

Unitrends MSP

The information age is upon us and your clients are grappling with how to effectively deal with the data explosion. They need help in efficiently backing up critical data and ensuring they can quickly recover from disasters whether they be natural or inflicted by humans. Elite IT Solution and Managed Service Providers are selling industrial strength back-up and DRaaS solutions that are addressing the situation, mitigating the risk and complexity of ensuring error-free backups that can be restored quickly in the event of a disaster.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

TLS/SSL Inspection for Stronger Cybersecurity

With cyberattacks becoming easier and cheaper to launch, it’s no surprise that 80.5% of technology leaders consider cyber attacks at their organization likely. Pulse and A10 Networks surveyed 200 technology leaders to find out how their companies are thinking about SSL inspection and decryption solutions as part of a Zero Trust strategy.
Watch Now

Spotlight

One of the greatest risks you will face in your Microsoft environment is Business Email Compromise. This attack costs organizations around the world millions in losses each year, with no signs of slowing down.

resources