Incident Response Masterclass: Investigate a Rogue Insider with Varonis

Varonis

Join our IR team for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities. During this training session, our security analysts will execute a new attack scenario in our lab. An insider was paid to exfiltrate sensitive organizational data. To remain uncovered, he takes control on a service account. Using the service account, he scans company filers for documents with indicating keywords. Copies matching documents to his PC.
Watch Now

Spotlight

Microsoft's Mark McIntyre interviews Circadence's Keenan Skelly, VP of Global Partnerships and Security Evangelist, on the widening cyber skills gap and how companies can and should shift to a persistent cyber learning and training strategy that prioritizes skill building and cyber competency.

OTHER ON-DEMAND WEBINARS

How Zero Trust can help protect financial services networks

Forescout

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join SC and ForeScout to learn how to embrace Zero Trust to: Proactively combat today’s high frequency and sophistication of cyberattack. Gain unparalleled situational awareness of malicious activity. Prevent the transfer of sensitive data and money. Simplify adherence to compliance regulations.
Watch Now

The Role of Threat Intelligence in Cyber Resilience

Omnibus healthcare information security

When security controls fail, can you detect unusual and anomalous activity with sufficient context to accurately ascertain the risk to the organization? Most organizations don't even know when security controls have failed. This is a primary reason why intrusions exist in organizations for upwards of 200 days before being discovered. Additionally, heuristic and homogeneous alerts provide virtually zero context about anomalous activity inside the internal network and do nothing to help cyber defense teams prioritize and correctly remediate cyberattacks.
Watch Now

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention

CyberX

This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.
Watch Now

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now

Spotlight

Microsoft's Mark McIntyre interviews Circadence's Keenan Skelly, VP of Global Partnerships and Security Evangelist, on the widening cyber skills gap and how companies can and should shift to a persistent cyber learning and training strategy that prioritizes skill building and cyber competency.

resources