Cyber Attacks

Discover the latest collection of talks and videos on Cyber Attacks from industry experts.

Coming up next

Tools are Nothing: Why People and Process Matter More in Data Security and Privacy
Channel Logo

Tools are Nothing: Why People and Process Matter More in Data Security and Privacy

The current data security and privacy protection landscape is awash with tools, acronyms, buzzwords that promise to make data breaches and privacy
incidents a thing of the past. Yet hotel chains, healthcare providers, banks, department stores and even governments constantly fall victim to data breaches,
ransomware or nation-state attacks. The plain truth is that tools are only as good as the people that use them and the processes that go with it. Two thous…

Strengthen Data Security Strategy for Tomorrow's Resilience Defense
Channel Logo

Strengthen Data Security Strategy for Tomorrow's Resilience Defense

Cyberattacks are continuing at pace and we're regularly hearing of new data breaches. But who is responsible for ensuring the security of personal data?
Traditional data protection approaches are failing against modern attack vectors. Organizations need future-ready strategies that go beyond compliance
checkboxes to create resilient security frameworks. In this session, we'll explore the current risks to personal data & privacy and delve into the range of mo…

Simplify Firewall and Network Management with a Unified Platform
Channel Logo

Simplify Firewall and Network Management with a Unified Platform

As networks grow, so does the complexity of managing firewalls, endpoints, and other security solutions. Constantly switching between tools slows response
times, increases costs, and introduces risk. In fact, MSP Today reports that 75% of MSPs use four or more tools and 94% are actively seeking a unified
cybersecurity platform. Centralized management doesn’t just solve these challenges; it strengthens security. By consolidating every device and policy und…

ESET PROTECT Complete Demo and Q&A
Channel Logo

ESET PROTECT Complete Demo and Q&A

Join us for a weekly session to see ESET's latest offerings in an in depth demo of ESET Protect Complete. This software bundle is full of our secure
components such as Vulnerability & Patch Management, Ransomware Remediation and Full Disc Encryption. Following the demo one of our engineers will join
us for a Q&A session.

The future is coded: Hands-on advancing detection engineering
Channel Logo

The future is coded: Hands-on advancing detection engineering

Tired of manually managing brittle detection rules? Struggling to scale your threat detection capabilities reliably? It's time to move beyond the GUI and
embrace Detection as Code (DaC). This practical webinar will guide you through the application of software engineering principles – version control,
automated testing, and CI/CD – to your security detection lifecycle. Forget dry theory; we're going to dive deep into establishing a foundational DaC workflo…

Cyberthreats to modern automotive industry
Channel Logo

Cyberthreats to modern automotive industry

Modern cars are no longer just a means of transportation. Their built-in services can manage everything for drivers and passengers alike from seat heating,
to using voice-controlled GPS to find a coffee, or make theater ticket reservations. Along with the development of consumer services, driver safety services
have also been developed – distance sensors to neighboring cars, speed limit recognition and the eCall safety system, to name a few. These hi-tech solutio…

Scaling trust: Building AI governance that drives strategy and value
Channel Logo

Scaling trust: Building AI governance that drives strategy and value

AI governance is no longer a theoretical exercise — it's a business imperative. But how do you move from policy to practice? Join us for a dynamic fireside
chat with Ravi Krishnamurthy, Vice President of Product Management for AI Foundation and Responsible AI at ServiceNow, who will share his experience with
tackling the complexities of AI governance head-on — from early roadblocks to building a scalable, transparent AI control tower that aligns with business str…

Navigating SaaS Data Exposure | Embrace SaaS, Risk Less with AppOmni
Channel Logo

Navigating SaaS Data Exposure | Embrace SaaS, Risk Less with AppOmni

What if the biggest threat to your data wasn’t a breach—but your own SaaS configurations? In this fast-paced session, AppOmni experts pull back the curtain
on how SaaS data exposure actually happens. Spoiler: attackers often don’t need to break in—the front door is wide open. You’ll learn: The front door is
actually open – attackers don’t need to hack in when data is already exposed SaaS apps evolve faster than your team can keep up – creating dangerous mi…

Attend Summits on Cyber Attacks

Cyber Threats and Breach Protection

Cyber Threats and Breach Protection

Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all
sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and lead…

|22 sessions
The 2023 Threatscape

The 2023 Threatscape

2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…

|37 sessions
Ransomware Protection Best Practices

Ransomware Protection Best Practices

Learn the best ways to defend against, mitigate and recover from a ransomware attack.

|16 sessions
CISO Summit

CISO Summit

CISOs are dealing with unprecedented challenges. The integration of AI in both attack and defense mechanisms coupled with the rise of increasingly
sophisticated cyber threats means they must protect against more complex attacks while aligning security strategies with broader business objectives. T…

|17 sessions
The 2025 Threatscape

The 2025 Threatscape

While traditional methods of attack such as ransomware, malware, and email phishing will persist, security strategies must now address emerging concerns
like the growing prevalence of AI and the near-universal employee use of mobile and IoT devices. Attend this Summit to gain insights from renowned indu…

|19 sessions
The 2024 Threatscape

The 2024 Threatscape

Organizations must prepare for increasingly sophisticated and costly cybersecurity risks in the year ahead. While traditional methods of attack, such as
ransomware, malware, and email phishing, will persist, security strategies must now address emerging concerns like the growing prevalence of AI and the …

|15 sessions

Watch series about Cyber Attacks

Thought Leadership Thursday
37 episodes
Series Company Logo

Thought Leadership Thursday

Designed to provide valuable knowledge and actionable guidance, Adlumin’s Thought Leadership Thursday webinar series explores a wide range of
cybersecurity topics, including threat hunting, incident response, insider threat detection, compliance, and more. Each session features a renowned expert …

Watch series

Cyber Defense Summit 2025
20 episodes
Series Company Logo

Cyber Defense Summit 2025

Ready to level up your defense against today's most sophisticated cyber threats? The Cyber Defense Summit, an exclusive event from Mandiant and Google
Threat Intelligence, is now available for you to watch on demand. Stream keynotes and deep-dive sessions on securing AI innovation, building executive re…

Watch series

Threat Report Serie
32 episodes
Series Company Logo

Threat Report Serie

In-depth analysis of real-world, extensive cyber threat data gathered by the SonicWall Capture Labs threat researchers every year. The SonicWall Cyber
Threat Report provides critical insights, actionable intelligence, and trend analysis and changes in cybercriminal tactics needed to safeguard your organizati…

Watch series

Secureworks Cyber Shorts
9 episodes
Series Company Logo

Secureworks Cyber Shorts

Cyber Shorts is brought to you by Secureworks. In this series, we talk about short and snappy topics around trending topics in cybersecurity.

Watch series

Webinars
17 episodes
Series Company Logo

Webinars

Keep up to date with the latest insights in to cyber security, hosted by our experts

Watch series

Fortinet Security Operations
35 episodes
Series Company Logo

Fortinet Security Operations

The Cybersecurity threat landscape is rapidly evolving, and many companies are not able to adapt quickly enough. This can be due to a limited number of
skilled personnel, operational complexities, or inadequate technology. Watch our webinar series to discover how Fortinet Security Operations solutions can …

Watch series