Featured

Four Seasons In One Day: Protect Your Org during Back to School
Mark Sangster, VP Chief of Strategy
As we enter a seasonal inflection of back to school, criminals will use this time of change to exploit your personal and organizational accounts. Join experts as they prepare you for the season and map out a training plan to empower your people and ensure criminals get an "F" this year.
You’ll walk away from the session understanding how to:
- Use risk management data and accurate phishing lures to build comprehensive awareness training
- Maximize your resources and programs to increase return on investment
- Conduct testing that improves resilience
- Meet regulatory requirements and demonstrate program success to your leadership
As a thank you for joining our webinar, we’ll send you Mark Sangster's white paper, The Importance of Proactive Security. Additionally – one lucky participant will receive a $200 Amazon gift card.
All episodes
-
Threat Hunting that Protects Your Business from Cyber Risks
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable when it comes to stopping malware-based attacks before they become business disrupting or cripple operations.
Join Adlumin's Director of Threat Research, Kevin O'Connor, as he unpacks real-life examples of how Adlumin’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.
-
Cybercrime - Working with the FBI: Become Empowered. Not a Victim.
Steve Lupo, Special Agent, FBI Houston Cyber Task Force/FBI SWAT and Mark Sangster, VP, Chief of Strategy, Adlumin
Cybercrime is a two-sided coin. On the one side, the industrialization of cybercrime and ransomware will operate with impunity. Meaning attack volumes and sophistication will continue to rise. On the other side, far too many organizations think they are not a target and are incapable of stopping sophisticated cyber adversaries.
Join industry expert and author Mark Sangster and FBI Special Agent Steve Lupo as they dispel misconceptions, expose trends, and explore ways to work with law enforcement. Learn how to protect your business before it falls victim to the next headline-writing cyberattack.
-
Protecting Your Organization with Proactive Defense Programs
Mark Sangster, Vice President, Chief of Strategy at Adlumin, Jeff Garner, Channel Account Manager at KnowBe4
Most crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training and testing, they focus on overly simplistic lures that fail to represent the real danger of targeted campaigns. Join our panel of experts from Adlumin and KnowBe4 as they explore how to build a comprehensive training and testing program that leverages realistic threat scenarios to foster context-relevant security awareness and phishing testing that drives meaningful behavioral change across your organization.
- Use risk management data and accurate phishing lures to build comprehensive awareness training
- Maximize your resources and programs to increase return on investment
- Conduct testing that improves resilience
- Meet regulatory requirements and demonstrate program success to your leadership -
Threat Hunting that Protects Your Business from Cyber Risks
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise, and increasing revenue in terms of ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable when it comes to stopping malware-based attacks before they become business disrupting or cripple operations.
Join Adlumin's Director of Threat Research, Kevin O'Connor, as he unpacks real-life examples of how Adlumin’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.
-
Cybersecurity and AI: Managing the Evolution of the Threatscape
Diana Kelley, Cybrize | Erick Galinkin, Rapid7 | Nash Borges, Secureworks | Mark Sangster, Adlumin
According to research by Capgemini, two-thirds of businesses now understand that AI is a necessary component in the race to secure your organization. The attack surface in 2022 is larger and more sophisticated than ever before, with ransomware and breaches at an all-time high. The ability to detect cyber threats quickly, to have proactive security measures, and detect new, malicious threats, is more critical than ever.
In this month’s episode of The (Security) Balancing Act, we’ll ask, ‘is AI the answer to the evolution of the threatscape?’
Join us in this session as we discuss:
- Use cases for AI in cyber - where does it fit and where it doesn’t
- Can AI replace cyber analysts?
- The importance of resilient AI
- What we mean by predictive intelligence, and why it’s important
- How to implement AI into your security
- The technology AI can leverage to improve your security posture
- The future of AI in the cybersecurity space -
Don’t Get Cyber Snagged: Recognizing and Reporting Suspicious Activity
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues. Join security expert and author, Mark Sangster and threat intelligence veteran, Kevin O’Connor as they review emerging threats and attack techniques, and unpack the latest exploitations, and growing trends in the threat landscape.
What You Will Learn
- Explore the latest phishing trends and tactics
- Expand your ability to identify suspicious activity and report it
- Build defenses to protect your employees in the office and their homework environments -
Tackling the Patching Pandemic to Protect Your Business
Mark Sangster, Vice President, Chief of Strategy at Adlumin, Skylar Moran, Director of Customer Success, Adlumin
They say you're only as good as your weakest link. Cybercriminals routinely use vulnerabilities in IT infrastructure to infiltrate the business, steal assets or launch a massive ransomware attack. Keeping up with vulnerabilities and patching requirements is already an IT challenge. Now with exploits like SolarWinds, Kaseya, and the Microsoft Exchange HAFNIUM the problem is only getting worse.
Join experts from Adlumin as they tackle the patching pandemic, demonstrate simplified management of core systems, and how to avoid crippling attacks that exploit your defenses.
What will I learn?
- Why ransomware-as-a-service and the industrialization of cybercrime accelerate attacks and increase the number of adversaries who can enter the market
- Best practices to reduce the cracks in your defenses that are often leveraged by criminals.
- How continuous vulnerability management creates a centralized approach to patch management and identifying critical vulnerabilities. -
‘Tis the Season. The Twelve Gifts of Cyber.
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
On the first day of access, the criminal deployed to me, ransomware delivered remotely!
Join author and Chief of Strategy Mark Sangster, and threat intelligence veteran Kevin O'Connor as they take a whimsical look at 12 cyber trends and lessons covering ransomware attacks, Gootloader gang activity, and cyber stocking stuffers. You'll also hear directly from customers how Adlumin's helping them enjoy and relax over the holidays.
What you will learn
- New findings in ransomware trends and how to protect against them
- Lessons learned about Gootloader gang (definitely on the naughty list)
- How to give a boost to your EDR and NGAV
- Why continuous vulnerability management helps to keep the grinch away -
The Evolving Role of the Banker in Today's Cyber Landscape
Mark Sangster, VP, Adlumin, Pam Kaur, Head of Bank Technology, BankTech Ventures, & David Shipley, CEO, Beauceron Security
Cybersecurity culture is more than just awareness. It requires employees from all departments to participate in the broader corporate culture of daily actions, encouraging them to make mindful decisions that align with security policies. Join a panel of industry experts from Adlumin, BankTech Ventures, and Beauceron Security as they discuss hot topics, including cyber threats that are top concerns for businesses and why you want to keep an eye out for them, how easily bank employees’ emails are compromised, and how to be proactive with your security.
Takeaways:
—Why you should invest in password managers for both business and personal.
—Importance of regular tabletop exercises with technical and nontechnical teams.
—How to create a cybersecurity culture across the entire organization. -
From Chaos to Cyber Compliance: Cyber Requirements for Businesses
Mark Sangster, Chief of Strategy, Adlumin; Wayne Hunter, CEO, AvTek Solutions, Inc.
PART 2: From Chaos to Cyber Compliance Webinar Series
This webinar series explores the following:
Risks associated with mobile and cloud computing – and three critical policies, procedures, and protections every business must implement to protect itself. Overlooking just one of these leaves your organization vulnerable to security breaches, damaging and expensive litigation, and exposing confidential company information to competitors, hackers, and cybercriminals.
Truths about bank fraud, which are unknown to most businesses, and how they could (literally) wipe out your bank account.
Why firewalls and anti-virus software give you a false sense of security.
What it takes to protect your organization against emerging threats and sophisticated cybercrime rings.
-
From Chaos to Cyber Compliance: How to Solve and Maintain your Cyber Compliance
Mark Sangster, Chief of Strategy, Adlumin; Wayne Hunter, CEO, AvTek Solutions, Inc.
This webinar series explores the following:
1. Risks associated with mobile and cloud computing – and three critical policies, procedures, and protections every business must implement to protect themselves. Overlooking just one of these leaves your organization vulnerable to security breaches, damaging and expensive litigation, and exposing confidential company information to competitors, hackers, and cybercriminals.
2. Truths about bank fraud, which are unknown to most businesses, and how they could (literally) wipe out your bank account.
3. Why firewalls and anti-virus software give you a false sense of security.
4. What it takes to protect your organization against emerging threats and sophisticated cybercrime rings.
-
Local-Level Threats: Cybersecurity Strategies for Regional Businesses
Dave Gruber, ESG; Mark Sangster, Adlumin
Securing your infrastructure is a challenge for any kind of business in 2023. Between the uncertainty of the current economic landscape and the difficulty of maintaining on-premise and cloud hybrid environments, cybersecurity teams have to factor in a lot of moving parts. For regional businesses, the problems are often exacerbated by less-developed security strategies, limited resources — and a higher volume of cyberattacks. To protect against these digital threats, it’s critical for regional organizations to explore the right cybersecurity solution for their specific needs.
What works for an enterprise-scale business is not always what’s best for regional companies. An effective security strategy requires skilled staff, financially accessible technology, and the appropriate architecture for your operations. For many organizations, turning to MDR solutions is the most efficient use of resources and the most effective way to secure your data. Identifying the right MDR vendor is therefore one of the most important components of your cybersecurity strategy.
In this webinar from Adlumin and ESG, industry experts will uncover what threats regional businesses should be paying attention to and outline how to find the right MDR vendor for your architecture.
Tune in to hear more about:
— The unique security challenges that plague regional-level organizations
— How to conduct an internal security audit and pinpoint your MDR needs
— The Adlumin platform and the importance of transparency, SOC and live reporting
— And much more -
Beauty Is in the Eye of the Deceiver
Mark Sangster, Vice President, Chief of Strategy, Adlumin and Kevin O’Connor, Director of Threat Research, Adlumin
Deception Technology for Your Zero-Trust Arsenal
Traditional security measures are no longer enough to keep up with the increase in sophisticated cyber threats. Join Adlumin's experts as they discuss zero trust and complementing detection and response capabilities with deception technology. Deception provides not only early-warning detection but insight into criminal tactics and techniques. This threat intelligence is critical to protecting your business.
Join Mark Sangster, Adlumin's Vice President, Chief of Strategy, and Kevin O'Connor to learn:
- An understanding of how zero trust applies to cyber risk management
- How to use deception technologies to detect threats quickly and gain threat intelligence into criminal tactics and techniques
- Ways to complement detection and response capabilities with deception technologies to strengthen your security posture -
Learning from Your Adversary: An Inside Analysis of the Latest Cyber Threats
Mark Sangster, Chief of Strategy at Adlumin and Kevin O’Connor, Director of Threat Research at Adlumin
Understanding which industries criminals target, how they exploit their victims, and why they prefer these organizations is key to protecting your business or operations. Join Adlumin experts as they look inside the latest threats, criminal tactics, and techniques and reverse engineer defensive measures organizations can take to protect themselves from top-tier ransomware gangs and state-sponsored hackers.
-
Cyber-Resiliency for Government Agencies of all Sizes
Mark Sangster -Vice President, Chief of Strategy, Adlumin Inc. and Deb Snyder -Senior Fellow, Center for Digital Government
Government agencies of all sizes face increased pressure to safeguard data, protect mission-critical operations and stay compliant, but doing so can be particularly challenging for smaller agencies.
While many larger organizations have the resources to handle cybersecurity operations, smaller agencies are often constrained in their ability to address critical security needs. Municipalities, localities and smaller cities and states all work with a vast amount of sensitive data that can be of value for cybercriminals, yet often aren’t equipped with the tools necessary to take command of security and compliance.
Join Government Technology to learn proven methods to reduce cybersecurity risk, regardless of agency size or location. As a participant in this webinar, you’ll learn how to:
- Detect and respond to cyber threats with limited in-house security
- Minimize cybersecurity vulnerabilities
- Automate compliance reporting -
Enterprise Strategy Group’s ransomware survival guide
Mark Sangster, Chief of Strategy, Adlumin & Dave Gruber, Principal Analyst, ESG
According to Enterprise Strategy Group’s independent research, 79% of today’s organizations have experienced a ransomware attack in the past 12 months. The hard truth is, many businesses think they’re prepared – that is, until ransomware actually strikes.
In this session, ESG Principal Analyst Dave Gruber presents essential threat intelligence and actionable insights based on his extensive field experience regarding the top ransomware trends today and best practices for surviving an attack. Topics covered inside include:
• Ransomware by-the-numbers: ESG’s most pressing threat statistics
• Critical decision points during an attack (and why they matter)
• ESG’s unbiased advice for achieving a winning ransomware defense strategy
• And much more. -
Selling the Benefits of a SOC: Explaining AI to Business Leaders
Mark Sangster, VP, Chief of Strategy, Adlumin
As a cybersecurity professional, you understand the benefits of a Security Operations Center (SOC), but translating the need to your business leaders can be daunting, especially when it comes to AI. ChatGPT, hyped-up marketing and general confusion about AI and machine learning compound the problem. Join Adlumin expert Mark Sangser, VP, Chief of Strategy, as he explores these topics and masters the translation from the ones and zeroes of security to the dollars and cents with which non-technical business leaders are fluent:
- How proactive security programs reduce risk and improve business outcomes in the face of cyber threats
- Why full visibility across your organization is critical to stopping threats in their early stages
- How AI and machine learning accelerate response times and empower security teams to contain threatsLastly, Mark will evaluate various security solutions and provide a structured means of explaining capability and benefits to your business leaders.
-
Cybersecurity Strategies for Healthcare Organizations: A Fireside Chat
Mark Sangster, VP, Adlumin, John Gaede, Director of Info Services at Sky Lakes Medical, Mike Perryman, Manager of Tech System
A Fireside Chat with Adlumin and Sky Lakes Medical
Join us for an engaging webinar, "Cybersecurity Strategies for Healthcare Organizations.” In this exclusive session, we will provide an overview of Sky Lakes Medical's unique security challenges, focusing on three key areas: Security Challenges, Operational Challenges, and Customer Experience. Together, we will examine the evolving threat landscape and discuss effective strategies to safeguard healthcare organizations from cyber threats.
Don't miss this opportunity to learn from the experts and gain actionable knowledge that can enhance your organization's cybersecurity posture.
-
5 Cybersecurity Best Practices to Impress Business Leaders
Mark Sangster, VP, Chief of Strategy, Adlumin
A cybersecurity journey is not a sprint – it’s a marathon filled with obstacles set up by cybercriminals angling to extort your organization. Just like preparing for a marathon, there are small changes participants make when training that you, a cybersecurity professional, can draw on to strengthen your security and impress business leaders.
Join Mark Sangster for a cybersecurity boot camp where he’ll review the top 5 security tactics that you can implement today. From there, he’ll explore utilizing a Security Operations Center (SOC) to find and remediate threats in just 90 minutes.
-
Decoding PowerDrop Vulnerability: AI and ML in Adlumin's Threat Hunting
Kevin O’Connor, Director of Threat Research at Adlumin
In the ever-evolving landscape of cybersecurity threats, organizations face the constant challenge of detecting and mitigating sophisticated attacks in a timely manner. Implementing automation and machine learning into a threat hunting strategy is key, but what does that look like in practice?
Join Kevin O'Connor, Adlumin’s Director of Threat Research, as he demonstrates how his team discovered and remediated PowerDrop, an insidious PowerShell script for command and control attacks targeting the U.S. aerospace defense industry.
During Kevin’s live demo, you will learn:
- How Adlumin's Threat Research Team used Artificial Intelligence (AI) and Machine Learning (ML) to detect and remediate PowerDrop
- Daily threat hunting methodologies employed by O'Connor and his team
- Exploring the advantages of AI and ML in the field of threat huntingAs a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Overview to Proactive Cybersecurity: Harnessing the Power of Security Operations. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
The ABCs of Cyber: Assets, Budget, and Consolidation
Mark Sangster, VP Chief of Strategy, Adlumin and Dave Gruber, Principal Analyst with Enterprise Strategy Group
The boom of cyberattacks and echoes of responding to regulatory and state legislature outpace the resources, from both a budgetary and personnel standpoint, available to small to medium organizations. So, how can they keep up the pace against today’s rising tide of threats?
Join cyber experts Mark Sangster, VP at Adlumin, and Dave Grubber, Principal Analyst at Enterprise Strategy Group (ESG), as they outline a rapid roadmap to successful cybersecurity using consolidation to drive efficiency and manage cost. You’ll walk away from the session having learned the following:
- What are network protection must-haves?
- How to navigate compliance
- Best practices for streamlining your security operations using AI/ML
- How to thoughtfully approach your cybersecurity budget and make the most of every dollar.As a thank you for joining our webinar, we’ll send you our new overview guide, The Executive’s Guide to Cybersecurity. Additionally – one lucky participant will receive a $200 Amazon gift card.
-
Four Seasons In One Day: Protect Your Org during Back to School
Mark Sangster, VP Chief of Strategy
As we enter a seasonal inflection of back to school, criminals will use this time of change to exploit your personal and organizational accounts. Join experts as they prepare you for the season and map out a training plan to empower your people and ensure criminals get an "F" this year.
You’ll walk away from the session understanding how to:
- Use risk management data and accurate phishing lures to build comprehensive awareness training
- Maximize your resources and programs to increase return on investment
- Conduct testing that improves resilience
- Meet regulatory requirements and demonstrate program success to your leadershipAs a thank you for joining our webinar, we’ll send you Mark Sangster's white paper, The Importance of Proactive Security. Additionally – one lucky participant will receive a $200 Amazon gift card.