Forrester-Led Webinar: Connecting the Relationship Between Threat Intelligence and Adversary

Join Forrester Analyst Rick Holland and ThreatConnect Chief Intelligence Officer Rich Barger for a webinar on understanding your adversary and the importance of proper threat intelligence analysis to proactively defend your organization
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

OTHER ON-DEMAND WEBINARS

Threat Management & OT Threat Response using MITRE

The growing threat landscape for operational technology (OT) networks, exemplified by a number of recent ransomware attacks, has prompted critical infrastructure organizations to better prepare themselves for impactful cyber incidents. To do this, stakeholders responsible for critical infrastructure and services are maturing their security operations centers (SOCs) and increasing their use of cyber threat intelligence (CTI). Many now consider adversarial Tactics, Techniques and Procedures (TTPs) to be their most valuable CTI tool.
Watch Now

Breach Detection: Why SPOTTING a Breach is More Important than STOPPING it

activereach

In the current threat landscape, most businesses now recognise that it is only a matter of time before they are breached. This shift in philosophy from the idea of preventing every intrusion to realising that intrusions will happen is an important milestone. Sadly, hackers can hide in your network for days, weeks or months without your knowledge. UK businesses, especially SMBs, need to get smarter in their approach to detecting intrusions and limiting their impact.
Watch Now

BlackBerry Cylance 2019 Threat Report Highlights

Cylance

The BlackBerry Cylance 2019 Threat Report Highlights webinar is an opportunity to examine our conclusions with the researchers and analysts who authored the report. Join us for an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts will offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
Watch Now

Why You Need Artificial Intelligence for Email Security

The phishing threat has advanced. Stopping these threats requires a solution that’s built from the ground up using Artificial Intelligence (AI) and Machine Learning (ML). The architecture of yesterday’s rules and signature-based solutions simply are not equipped to handle these threats. In fact, of today’s advanced phishing threats, 51% require AI/ML to identify and stop. AI is clearly essential for cybersecurity. But the type of AI matters.
Watch Now

Spotlight

The Security Navigator reflects first and foremost the reality of the conflictual nature of cyber warfare. It mirrors the disinhibition of threat actors motivated by state strategies or hacktivism as well as criminal opportunities. In this environment, espionage, sabotage, disinformation and extortion are becoming increasingly i

resources