Understanding the Attack Landscape - Your Best Defense in Today’s State of Cyber Security

As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes. Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Aligning Security Solutions with MITRE ATT&CK

LogRhythm

The MITRE ATT&CK framework is quickly growing in popularity as an effective method to get on the offense of threat detection and response. In this webinar, presenters go beyond definitions and demonstrate how to apply the MITRE ATT&CK framework to your security monitoring. Paul Asadoorian and Matt Alderman of Security Weekly provide an overview of the MITRE ATT&CK framework, discuss how to prioritize the capabilities of the framework, and review some of the existing open source tools for testing/mapping to MITRE.
Watch Now

Attack Tactics 5 – Zero to Hero Attack

Black Hills Information Security

Presented BHIS Testers by: Jordan Drysdale, Kent Ickler, and John Strand. This is a re-recording of a live BHIS webcast that was presented on April 26th, 2019. Ever want to see a full attack from no access on the outside to domain takeover? Ever want to see that in under an hour? OWA? Password Sprays? Yup! VPNs? Remote account takeover? Yup! Fully documented command and tool usage? Yup! MailSniper? Absolutely! Nmap? Obviously.
Watch Now

Shaping the Financial Ecosystem with Secure APIs

Have you noticed that many of the leading banks and insurance companies have developer portals with APIs? In this webinar, we’ll discuss how customers’ needs for financial freedom are shaping the financial ecosystem, leading to an explosion of open APIs and a more integrated customer experience.We’ll discuss how and why finance
Watch Now

4 CI Security Best Practices To Prevent Cloud-Native Supply Chain Attacks

CI/CD pipelines are the heartbeat of cloud-native supply chains. Developers and DevOps teams depend on them every day to test, integrate, and deliver software, but as they become more exposed to the outside world, they can introduce new complexities and weaknesses. And as the saying goes, chains are only as strong as their weakest link.
Watch Now