Featured
Modernize Your Security Tactics: The Malicious Supercloud
Raj Samani - SVP, Chief Scientist at Rapid7
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
Join us for this webcast to learn more about the use of cloud computing from the malicious aspect and how to prevent attacks.
All episodes
-
Modernize Your Security Tactics Series: Workplace Predictions
Dan Lohrmann, Presidio | Earl Duby, XFactor.io | Erick Galinkin, Rapid7 | Maria Thompson, AWS
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
In this episode, join us as we take a deep dive into 2023 security trends and discuss:
— Dan Lohrmann’s 2023 security predictions - visit the attachment section for the full article!
— How the ‘New Normal’ of work and IOT are affecting the security posture of organizations
— The expansion of AI and its ramifications for CISOs and IT Departments
— And more -
Modernize Your Security Tactics Series: Vulnerability Intelligence
Caitlin Condon, Erick Galinkin and Ron Bowes from the Rapid7 Research team
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
During this episode, we will discuss:
- Significant vulnerabilities from 2022, including many that continue to be actively and widely exploited
- The narrowing window of time between when a vulnerability is disclosed and when it is exploited in the wild (56% of report CVEs were exploited within seven days)
- Attacker behaviour trends, including shifts in the ransomware landscape
- Practical guidance for security practitioners and executives -
Modernize Your Security Tactics Series: Strategic Planning
Dan Lohrmann, Presidio | Earl Duby, XFactor.io | Aaron Herndon, Rapid7 | Josh Harr, Rapid7
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
Join us for this episode as we explore how cybersecurity experts can build out a strategic security plan that works for their teams and their companies.
Topics for Discussion Include:
- The evolution of threats CISOs face
- Why a strategic security plan is more important than ever
- How teams can use proven strategies to build a plan that fits their unique requirements
-And more -
Modernize Your Security Tactics: Decentralized Identity
Mary Jane Dykeman, INQ Law | Tod Beardsley, Rapid7
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
Join us for this episode as we break down decentralized identity and discuss:
- Why decentralized identity is so key today
- The role of DIDs (Decentralised Identifiers)
- How to create and sustain trust
- Getting started with decentralized identity
- And much more! -
Modernize Your Security Tactics: The Malicious Supercloud
Raj Samani - SVP, Chief Scientist at Rapid7
Organizations around the world are struggling to keep up with the latest in security threats, data protection regulations, and IT infrastructure. Maintaining a strong footing means understanding exactly how to allocate your resources effectively. We’ve curated a series of webinars to guide you as you prioritize your efforts, spend effectively, ensure you have the right checks and balances in place, and discover your most vulnerable points.
Join us for this webcast to learn more about the use of cloud computing from the malicious aspect and how to prevent attacks.