Demystifying AI for Cyber Security

Eurofins Scientific

From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI-powered technology offers a proven approach to combat the threats that could already be inside the network – before they escalate into a crisis. Join Eurofins’s VP of Cyber Security, Sean Walls, and Darktrace’s Director of Enterprise Cyber Security, David Masson, to discuss how advances in autonomous AI are shaping the way security teams visualize, detect, and respond to emerging threats – all in real time.
Watch Now

Spotlight

hey’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments, resulting in millions of dollars in loss and throwing the tech world into chaos.We’re talking about cyber attackers though, not ninjas. Although, the two are remarkably similar.

OTHER ON-DEMAND WEBINARS

Cyber Value-at-Risk Webinar

Uleska

Cyber Value-at-risk (VAR) offers a revolutionary industry approach helping Enterprises with effective cyber management and vulnerability remediation prioritization. Simply classifying risks in broad terms such as “high”, “medium” or “low” does not tell you a business story. Understanding the business impact of various technical cyber issues, including responses costs, replacement costs, and potential regulatory fines, allows a business vision into true cyber business risk. Why attends this webinar? 1) Understand how cyber security compliance issues can be subject to regulatory fines.
Watch Now

Understanding the Attack Landscape - Your Best Defense in Today’s State of Cyber Security

Alert Logic

As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes. Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.
Watch Now

Overcoming the Challenges of Credentialed Scanning

Tenable

Get the visibility you need to build an effective cyber exposure plan. You know authenticated or credentialed scanning provides more detail about your existing assets, along with the deepest possible understanding of the exposures in your environment. So why aren’t you taking more advantage of authenticated scanning? When we talk to security professionals who are hesitant to run credentialed scans, their story hasn't changed much in over 8 years. Two things stand out: Lack of trust. They're uncomfortable inputting credentials into a third-party, less-trusted source. Too much information. The tsunami of data generated by credentialed scanning is challenging to prioritize. If you're not taking full advantage of credentialed scanning, you need to watch this on-demand webinar to learn how Tenable and CyberArk integrate to: Provide details on what don’t you know about your environment, giving you a complete cyber exposure view.
Watch Now

Hacker vs CISO: How to Exploit/Protect the WFH Workforce

A Former Hacker and a Current CISO Face Off In today’s world where entire workforces were forced to move to an entirely remote work environment overnight, IT security leaders are facing new cyber attacks every day. Not only have hackers and adversaries become more sophisticated over the past decades, the hastily distributed work
Watch Now

Spotlight

hey’re crafty, covert, and silent. They have the tools, skills, time, and patience to unleash underground attacks on even the most fortified walls. Last year, these masters of stealth managed to sneak into some of the world’s biggest establishments, resulting in millions of dollars in loss and throwing the tech world into chaos.We’re talking about cyber attackers though, not ninjas. Although, the two are remarkably similar.

resources