Playbook For Defending Your Network And Reducing The Risk Of A Cyberattack

When was the last time you had a breach? Are you sure? Today’s attackers are remarkably sophisticated—and can lie in wait for months before you even notice their presence. Here’s the hard truth: if you haven’t detected an attack/compromise in the last 12 months, it is NOT because it’s not happening – it’s because you’re not looking in the right places. A compromise in your network is inevitable – if it isn’t already happening now, it will soon. Given that 100% security simply doesn’t exist, what can you do to control and minimize the damage from attacks? In this previously recorded webinar, my firm will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cybersecurity Framework to Secure OT/ICS/SCADA Systems from Targeted Attacks

Join our experts in the digital event cybersecurity framework to secure OT/ICS/SCADA systems from targeted attacks With growing cyberattacks on ICS and SCADA systems, this is the time to revisit your OT cybersecurity measures and strategies to see if they are aligned with the new cyber realities that are already impacting businesses. The need of the hour is to invest in a robust yet an agile program that will reduce your risk exposure and deepen your institutional cyber resilience
Watch Now

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Leveraging Analytics for More Effective Security Performance

BitSight

More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off — and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to your organization? Security ratings and the analytics they provide give businesses a unique insight into their organization's security performance and posture in relation to their peer group.
Watch Now

Kubernetes Security

Kubernetes security is becoming more challenging as the number of clusters running cloud-native applications continues to multiply rapidly. Challenges range from allowing in only legitimate traffic and enabling least-privileged communications between services to defend against attacks moving laterally between clusters, to validating how a workload is operating within the expected guardrails.
Watch Now