The Power of AI to Disrupt Security Ops

GovInfoSecurity

Many of today's companies are hesitant to adopt new security technologies - particularly AI. The truth is AI is successfully disrupting many areas of security operations and shifting us away from the traditional SOC and man-led threat intelligence. In this webinar, Chris Calvert will introduce the concept of autonomous security driven by AI, probability theory and advanced algorithms. These new technologies apply reasoning, judgement and experience to identify threats and make decisions at the scale, speed and consistency no human can match, freeing up analysts for higher level investigation and response actions.
Watch Now

Spotlight

Threat Intelligence and Incident Response: A Study of U.S. and EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their companies handle the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.

OTHER ON-DEMAND WEBINARS

API Security Through the Lens of Modern DevSecOps

Application Programming Interfaces (APIs) have evolved into business-critical services with a unique set of application security needs. The evolution of the Business Logic Layer was accelerated in part by the popularity of the Postman API Platforms; however, traditional security testing products have struggled to adapt. This next generation of business logic API collections require a fundamentally new technology and native testing experience that empowers organizations to overcome modern security challenges.
Watch Now

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now

Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

Spotlight

Threat Intelligence and Incident Response: A Study of U.S. and EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their companies handle the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.

resources