In this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!
Artificial intelligence has opened new doors for scammers, giving rise to sophisticated threats like deepfakes and voice cloning. Today’s cyberattacks now leverage AI to infiltrate organizations through voice and video manipulation, making it harder than ever to distinguish real from fake. Join us for a dynamic, interactive session where you’ll discover the latest trends in cyberattacks and gain practical strategies to defend your organization. This session will equip your team with the knowledge and tools necessary to stay ahead of AI-powered threats and reduce your organization’s risk.
Software supply chains are under attack like never before, with sophisticated threats targeting third-party vendors and suppliers. Join our webinar to explore the latest 2024 supply chain breaches, including incidents at Sisense, Okta, JetBrains, and more. Our experts will provide actionable insights, featuring a live demo of a zero-day exploit and its real-world impact. Learn how you can minimize damage with effective third-party risk management and robust security strategies.
What’s hot in cybersecurity this summer? In this fast-paced webinar, we’ll discuss new exploits and the latest security research from the 2024 Black Hat and DEFCON conferences. We’ll also share the conference highlights, what they mean for you, and what your organization can do to defend itself against an increasingly complex and dangerous digital landscape.
What makes the dark web so dark? Join us for a deep dive into the inner workings of the darkest corners of the internet. We’ll take you on a guided tour of the criminal underground and show how hackers and criminals use the anonymity of the dark web to sell their goods and hide their crimes. Unlock the secrets of the dark web with us and stay ahead of emerging hacker trends.
In today’s rapidly evolving cyber landscape, effective incident response is more critical than ever. Discover how to prepare your defenses through robust detection strategies, comprehensive incident response planning, and proactive team training. Don’t miss this opportunity to enhance your organization’s resilience against cyber threats.
Cybersecurity is about so much more than just technology—fundamentally, it’s about people, and from the boardroom to the server room, everyone plays a critical role. Join our webinar to learn the best practices in cybersecurity training and staffing to build a “human firewall” to help protect your organization against cybersecurity threats and reduce your risk of a data breach.
Ransomware is evolving! High-profile law enforcement takedowns are making cybercriminals change their strategies, and your old prevention methods don’t work like they used to. Attackers are using sneaky new tactics to stay under the radar longer, target your cloud data, and cause massive disruptions to your business. Join us for a deep dive into the modern methods that criminals rely on to carry out their attacks. Along the way we’ll give you practical tips to stopping ransomware attacks before they even begin. Don’t be caught off guard when it really matters. Learn how to protect your network and keep from becoming the latest headline!
Is your encrypted data really safe? How does cryptocurrency work? What makes digital contracts secure? These critical questions, and many more, will all be answered when you understand the fundamentally simple concepts of public key cryptography. Whether you’re a curious beginner or a seasoned pro, this webinar will demystify core concepts of data protection and digital transactions.
Cybercriminals exploit software vulnerabilities in your Internet-facing systems, send phishing emails to staff, or target your cloud infrastructure. Come and watch as Matt Durrin and Tom Pohl show you how to identify your attack surface, and provide critical tips on how to reduce your risk.
Cybercriminals are taking hacking to the next level by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear cybersecurity experts Sherri Davidoff and Matt Durrin share the biggest cybersecurity threats and most concerning criminal tactics for 2024 and how you can protect your organization.
Do you hate passwords? You’re not alone. Billions of stolen passwords are available on the dark web, and hackers now routinely sell tools to bypass multifactor authentication (MFA). To combat this, major technology providers including Microsoft, Google, and Apple are rolling out passwordless solutions. Join us as we talk about how to effectively migrate to new solutions and provide tips on future-proofing your critical technologies.
Find your weaknesses before the hackers do! In order to effectively defend your IT infrastructure, you need to explore your network in the same way as hackers. This practical, hands-on class will teach you to do just that: pentest your own network. Along the way, we’ll cover detailed remediation tips and test out various techniques for stopping attackers and ensuring that your changes work. Learn to hack your own network—and fix the issues—in this practical penetration testing class for IT professionals.
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Learn how to thwart hackers with simple configuration changes and strong auditing techniques.
Hackers exploit human vulnerabilities in order to divert funds, break into your cloud, install malware and more. Watch the latest attack trends and techniques in this fast-paced webinar.
Criminals are targeting cloud apps and infrastructure, stealing loads of sensitive information and holding companies hostage. How do attackers break in, and what exactly do they do with access when they have it? In this fast-paced talk, we’ll show you how hackers:
- Hijack API keys and Break into your cloud infrastructure
- Exploit common misconfigurations to scrape data and compromise applications
- Spread from on-prem to the cloud (and vice versa)
- Lurk in your systems to steal data, hijack payments, and more
- Hold your cloud data hostage unless you pay a ransom
Along the way, we’ll also show you tips and tricks on securing your cloud infrastructure and locking hackers out before they get their hands on your goldmine of data.
What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the 2023 Black Hat and DEFCON conferences in this fast-paced webinar. We’ll also share the conference highlights, what they mean for you, and what your organization can do to defend itself against an increasingly complex and dangerous digital landscape.