Recent talks on Attack Surface

What is true Attack Surface Management (ASM)? Why it’s time to rethink how you manage your attack
surface
In this session, we're joined by Michael Gianarakis and Shubham Shah, the co-founders of Assetnote, where we'll break down the flaws in traditional ASM and
explore how teams can take a more proactive approach that actually helps security teams reduce risk. Topics we'll cover include: - The risks of 'shadow
exposure' (the hidden attack surface) where threats are introduced by third-party tools like ServiceNow, Citrix, and Slack - Why IP-based scanning is not en…
How Many Tools Should it Take to Secure Your Entire Attack Surface
According to Enterprise Strategy Group, 93% of organizations use at least three tools to inventory their cyber assets. That means three different sources to
manage, three different UIs—and most importantly, three different interpretations of cyber risk. In this webinar, join Pablo Quiroga (Sr Director of Product
Management) at Qualys for a review of the threat landscape and the market challenges driving this disjointed approach, and a roadmap to a simpler progr…

Revealing the Missing Link: Complete Exposure Assessment with Hive Pro’s CAASM
What if your threat exposure management platform could do it all—from asset visibility to complete exposure assessment and validation—all in one place?
Join us for an exclusive first look at Hive Pro’s new Cyber Asset Attack Surface Management (CAASM) solution, now an integral part of our Uni5 Xposure
platform. This is more than just another CAASM tool—it’s the key to achieving a complete threat exposure management strategy through native exposure a…

The Anatomy of a Ransomware Attack, Revealed
Living Off the Land attacks. Hiding in encrypted traffic. Circumventing EDR. Bad actors are finding smarter (and sneakier) ways to launch ransomware
attacks, even in today’s most security-savvy enterprises. As ransomware attacks get more complex, how can you adjust your defenses? If you could detect
every inflection point of an attack as it unfolded in real time, what would you do differently? And how can network detection and response (NDR) help? Join …

Confidently Pinpoint and Respond to Real Threats Everywhere
Join Jane Man for an exclusive look at our product roadmap and exciting new features. Learn about MXDR enhancements to triage, investigate and respond
to alerts from third-party tools. Be among the first to learn about our latest innovation, Vector Command, and how it can validate your external attack
surface exposure and test your defences with continuous red team operations.

Discover the benefits of Searchlight Cyber's Partner Program
Join Searchlight Cyber as we explore partnership opportunities for MSSPs and VARs looking to stay ahead in dark web intelligence and Continuous Threat
Exposure Management (CTEM). Learn how we can work together to meet growing customer demands and drive business growth. - Be the first to know when
cybercriminals are targeting your customers - Enhance your offering and meet the demand for dark web intelligence - Increase your margins with dark we…

Precision AI™ Unlocked: Integrating AI-Driven Threat Intel with SecOps
Imagine a future where AI learns from real-time data, adapts to new attack vectors and anticipates threats before they strike. With Precision AI™ at the core
of Cortex XSIAM®, that future is now. Designed for security operations professionals evaluating AI-driven solutions for the SOC, this hands-on workshop goes
into advanced functionalities like automated playbooks, threat-hunting and behavior analysis across networks, endpoints and cloud environments. Participa…

Skyscanner | Ask Me Anything: Bug bounty and security success
Join Abel from Skyscanner, alongside Matthias from Bugcrowd, as they answer your questions on the impact of bug bounty on company security. From
understanding the enormous benefits of bug bounty to exploring the best practices for scaling these programs effectively, this session offers a
comprehensive look into leveraging crowdsourced security solutions for maximum impact. We’ll dive into: - Scaling your program and enhancing security …
Coming up next

Turning Incidents into Insights: A Product-Led Approach to Incident Response
From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer
enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead
of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proac…

[APAC] AI in Action: How Rapid7 is Redefining Security Operations
AI is transforming cybersecurity, and Rapid7 is at the forefront of integrating AI across our platform. In this session, we’ll dive into how AI is being used to
enhance security operations, with a special focus on real-world use cases from our SOC. Discover how AI helps Rapid7 detect threats, prioritize
vulnerabilities, and drive proactive risk management. We'll explore the wider adoption of AI, its practical applications, and the strategies we’re using to unlo…

Revolutionizing Application Security: From Complexity to Clarity
Embrace the Cloud with Confidence: Secure Your Cloud Journey Discover how a new approach, centered on integrating security, analytics, and performance
optimization into one unified platform, simplifies operations and enhances clarity in your security strategy. In this webinar, you’ll learn to: Consistently
enforce security policies across all environments Optimize application performance in real time Protect against advanced threats with AI-powered solutions

[APAC] Demystifying Cloud Detection & Response: The Future of SOC and MDR
As cloud environments grow more complex, security operations must evolve to address new challenges. This session explores the future of Cloud Detection
and Response (CDR), focusing on how modern SOC and MDR capabilities are adapting to provide the visibility and context needed for cloud coverage. We'll
discuss how SOC teams can leverage purpose-built tools to extend their detection and response capabilities from traditional on-premises environments to t…

Modernize Secure Access with Universal ZTNA and Endpoint Protection
Tired of Security Gaps and Complex Solutions? Join this webinar to learn how to improve your security posture with Universal ZTNA and endpoint protection.
Fortinet experts will discuss how our solutions: • Combat evolving cyber threats with a Zero-Trust approach and integrated endpoint protection. • Provide your
hybrid workforce with consistent security and user experience across all applications. • Reduce complexity and cost with a single, unified agent for VPN, ZT…

NIS2 Technology Stack: A Holistic Approach Using the Fortinet Cybersecurity Platform
In Episode 3 in our series "Navigating NIS2 Compliance with Fortinet SecOps" we propose a holistic approach to the alignment of an organization’s people,
processes and technology within the appropriate risk framework and map each requirement to suggested Fortinet solutions and services.

SD-WAN or Secure SD-WAN- Which is the Right Option for Your Organization?
There is a philosophical difference of opinion in the market regarding where security should be located - on-premises or in the cloud? Regardless of your
organization’s point of view, the choice of SD-WAN should be able to accommodate both options. This session from Fortinet’s Convergence 2024 event
focuses on the evolution of functionality of Fortinet’s SD-WAN and how it supports both environments equally.
Attend Summits on Attack Surface
Cyber Threats and Breach Protection
Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all
sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and lead…
Enabling Effective Threat Detection and Response
The current threat landscape is a vast one, demanding companies detect and respond to increasingly sophisticated attacks holding potential to cause
significant damage. With the proliferation of artificial intelligence (AI) and machine learning use, experts are concerned threat actors will weaponize this gr…
CISO Summit
CISOs are dealing with unprecedented challenges. The integration of AI in both attack and defense mechanisms coupled with the rise of increasingly
sophisticated cyber threats means they must protect against more complex attacks while aligning security strategies with broader business objectives. T…
The 2024 Threatscape
Organizations must prepare for increasingly sophisticated and costly cybersecurity risks in the year ahead. While traditional methods of attack, such as
ransomware, malware, and email phishing, will persist, security strategies must now address emerging concerns like the growing prevalence of AI and the …
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
The Breach Prevention, Detection and Response Summit
The average cost of a data breach in 2021 was estimated by IBM and the Ponemon Institute to be $4.24 million US dollars - up 10% from the average cost in
2019. And with the costs of data security breaches continuing to spiral each year, and the world shifting to a hybrid working model, it’s essential that busine…
Watch series about Attack Surface

Cyber Risk Series - Attack Surface Management Edition
From on-premises devices and applications across every endpoint, cloud, and container, Security and IT teams are looking for real-world insights and expert
perspectives on the newest attack surface management strategies successfully keeping threat actors at bay.
Command Your Attack Surface [NA/EMEA]
The expanding attack surface has dramatically increased risk and complexity across organizations. Traditional assessment approaches no longer scale,
leaving organizations scrambling to further prioritize, gain visibility and remediate their risk. In this 3-part webcast series we'll cover everything from; -The …
Command Your Attack Surface [APAC]
The expanding attack surface has dramatically increased risk and complexity across organizations. Traditional assessment approaches no longer scale,
leaving organizations scrambling to further prioritize, gain visibility and remediate their risk. This has led to many organizations purchasing pointed solutions…
Webinars
Keep up to date with the latest insights in to cyber security, hosted by our experts

Let’s Talk SOC – A Podcast Series Brought to You by Secureworks
Let’s Talk SOC is hosted by a panel of experts touching all topics across the cyber universe, with a focus on helping and empowering security and IT leaders to
better, prevent, detect and respond to today’s threats. From what happens in the first 24 hours following a cyberattack to why EDR alone may no longer b…

App and API Security | Akamai
Applications run our world. But as applications and users proliferate, so do security risks. Discover the latest application and API attack trends in Asia-Pacific,
and gain actionable insights from our Akamai security experts to protect your business.