Incident Response Masterclass: Investigate a Rogue Insider with Varonis

Join our IR team for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities. During this training session, our security analysts will execute a new attack scenario in our lab. An insider was paid to exfiltrate sensitive organizational data. To remain uncovered, he takes control on a service account. Using the service account, he scans company filers for documents with indicating keywords. Copies matching documents to his PC.
Watch Now

Spotlight

The challenges and risks of an everywhere world Every day, enterprise technology leaders are expected to support the digital imperative to work, develop, and deliver everything, everywhere — by bringing together distributed workforces, devices, clouds, systems, applications, and networks. But, there’s a problem. Technology teams

OTHER ON-DEMAND WEBINARS

Exciting Updates for Threat Response Cloud and TRAP 5.8

As security products move more into the cloud, Proofpoint continues to strengthen our Threat Response Auto-Pull solution. Join us for this customer session to learn about new features available to you, including our new audit-logging, internal incident response, and enhanced visualizations in Threat Response Cloud. We also have exciting new updates for TRAP 5.8 on-prem.
Watch Now

Enabling and Securing Remote Users of Teams

Microsoft recently reported that video calls on the Microsoft Teams platform grew more than 1,000% during the month of March, and they've added more than 12 million daily active users to the robust collaboration tool. According to Forrester, 85% of security breaches occur because of mismanaged licenses. Watch now to hear our sec
Watch Now

Managing Threat Detection and Response for Securing AWS

Alert Logic

Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy? Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.
Watch Now

Securing CI/CD Pipelines Through Security Gates

CI/CD pipeline security has become a pressing issue for DevOps and DevSecOps teams. With today's frameworks and best practices, various security gates can be applied through the CICD process from writing the very first line of YAML in the CI, and later to the CD process.
Watch Now

Spotlight

The challenges and risks of an everywhere world Every day, enterprise technology leaders are expected to support the digital imperative to work, develop, and deliver everything, everywhere — by bringing together distributed workforces, devices, clouds, systems, applications, and networks. But, there’s a problem. Technology teams

resources