Webinars

Webinars

  • Your Approach to Security Operations Must Evolve (Panel Discussion)

    Your Approach to Security Operations Must Evolve Modern SOCs play an essential role in any organization, and this goes beyond cybersecurity -- it has to do with the business entirely. This includes everything from earning trust from employees and customers to reducing impact and costs a potential breach may incur through data loss, lawsuits, or business reputation damage. In this panel, experts discuss the tools, techniques, and skills that today’s infosec professionals need for effective security operations and management. Gain insights around what is preventing organizations from building better security detection solutions, why individual growth and certifications are important, and more. Moderated by: Jon Oltsik, Sr. Principal Analyst, ESG Fellow Featuring: Joel Vincent, VP, Product and Technology Marketing, Cribl Sean Donnelly, Vice President of Product Incubation, Simspace Read More

  • Protecting organization data against cyber attacks, threats and data breaches

    Tune into this session to learn about the importance of identifying and protecting various types of assets within organizations and how using a multi-layered approach of implementing security solutions can reduce the risk of a potential cyber attacks and threats. Attendees will discover how threat actors locate sensitive information about their targets that can lead to compromising a company and stealing data. Furthermore, viewers will gain hands-on experience in getting started with using popular tools within the cybersecurity industry to identify security vulnerabilities on their systems and network while learning how to secure them. Lastly, viewers will explore the need for developing an incident response plan and creating a team that's well-prepared to catch any security event and handle any incidents. Key Takeaways: - Understand the need for data protection and defense-in-depth. - Discover how organizations leak sensitive data without knowing. - Get started with identifying potential security vulnerabilities. - Explore the need for incident response planning and procedures - Build an incident response team. Read More

  • How Hackers Compromise the Cloud Control Plane

    When the headline says “Cloud Breach Due to Misconfigured Server,” we’re only getting a small part of the story. Critical information on what really went down rarely becomes public knowledge. But in order to keep cloud data secure, it’s essential to understand how attackers are exploiting the cloud API control plane, and expand the blast radius well beyond the initial misconfigured resource in order to inflict real damage. In this session, Josh Stella, Chief Architect at Snyk, will walk through the ways control plane compromise attacks happen, and why you need to go beyond traditional cloud security posture management in order to spot the deeper design flaws in your environment that make these attacks possible. Attendees will gain an understanding of: -What the cloud control plane is and why attackers need access to it -How to identify control plane compromise risks in your environment -Why cloud security hinges with secure design, and where to start Read More