Becoming a Threat Hunter in Your Enterprise

For years, most IT security organizations have waited to detect new threats and  then moved swiftly to defend against them. Today, however, there is a new wave  of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In  this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now



Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Mid-year Data Breach Update: How the Latest Cyberthreat Trends Can Impact Your Identity Security

Last year saw a historic number of data breaches that exposed the personal information of millions of individuals to possible risk. In our new 15-minute webinar, we’ll be joined by the Identity Theft Resource Center (ITRC) to review 2022’s threat trends, the risks to businesses, and how employees and consumers can help protect their identity, credit and other personal data.
Watch Now

Knock, Knock! Who’s There. Finding Out Who’s Really on the Other End of that Password

As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As life on th
Watch Now

Zero Trust Security For Your Distributed Workforces

2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed. This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their technique
Watch Now