Thinking Like a Cyber Attacker: Strategies for Defense

Veracode

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Spotlight

Cyber criminals are persistent and attack from all angles. Are you staying ahead of these security threats? Is your security team too stretched already? Do you have preemptive measures in place? Learn how to take less time to determine when you are truly under attack, respond to incidents quickly and decisively, and keep your team ready to combat the latest attacker tools and techniques. Symantec Cyber Security Services is your trusted security partner who will become an extension of your security team and help your organization effectively mitigate risk, minimize detection and response times, enable compliance, and proactively tackle emerging cyber security threats.

OTHER ON-DEMAND WEBINARS

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

3-Minute Video: Overcoming the Challenges of an Unplanned Distributed Workforce

When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique structure was built for these challenging en
Watch Now

A CIO’s guide to maximizing the value of integration and APIs

From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar, Forrester consultant Corey McNair and M
Watch Now

Demystifying AI for Cyber Security

Eurofins Scientific

From vulnerable IoT devices to unsuspecting insiders, the reality of cyber security today is that we don’t know what’s lurking inside our networks. Faced with a looming shortage in cyber security skills professionals, combined with sophisticated threat-actors expanding their toolsets, AI-powered technology offers a proven approach to combat the threats that could already be inside the network – before they escalate into a crisis. Join Eurofins’s VP of Cyber Security, Sean Walls, and Darktrace’s Director of Enterprise Cyber Security, David Masson, to discuss how advances in autonomous AI are shaping the way security teams visualize, detect, and respond to emerging threats – all in real time.
Watch Now

Spotlight

Cyber criminals are persistent and attack from all angles. Are you staying ahead of these security threats? Is your security team too stretched already? Do you have preemptive measures in place? Learn how to take less time to determine when you are truly under attack, respond to incidents quickly and decisively, and keep your team ready to combat the latest attacker tools and techniques. Symantec Cyber Security Services is your trusted security partner who will become an extension of your security team and help your organization effectively mitigate risk, minimize detection and response times, enable compliance, and proactively tackle emerging cyber security threats.

resources