Featured
Everything you need to know about EASM and PTaaS — within CTEM framework
Laura Enriquez, Stef Geerits
External Attack Surface Management (EASM) and Pen Testing as a Service (PTaaS) provide valuable insights into a strong security plan to protect your organization. These tools contribute to key stages within the Continuous Threat Exposure Management (CTEM) approach, which protects your company’s networks, systems, and assets from cyber attacks, potential problems, and vulnerabilities - continuously.
Join our tech talk, where experts will answer common questions about the combined approach of EASM and PTaaS.
What you will walk away with:
— Understanding EASM: Dive into what EASM is, why it’s crucial for your security strategy, and its key focus areas. Even if you believe your asset inventory is complete, discover why EASM is still essential.
— Learn about PTaaS: Find out about PTaaS, how it’s different from traditional penetration testing, and why it’s important for security assessments. Discover the advantages and main features of PTaaS solutions.
— Contrasting EASM and PTaaS: Uncover the differences between these tools and verify if having both can be a good choice for your organization.
— Integrated Solutions: Explore the advantages of managing both EASM and PTaaS through a single interface, from the initial planning stages to final reporting.
This webinar is designed for IT professionals, chief information security officers, business leaders, and everyone committed to improving their organization’s cybersecurity posture. Whether you’re looking to implement EASM, PTaaS, or both, this session will provide you with the knowledge to make informed decisions and implement best practices tailored to your organization.
Don’t miss this opportunity to challenge your security strategy — secure your spot today.
All episodes
-
Cyber security predictions and quick wins in 2023
Darren James - Technical Lead
Cyber attacks are expected to increase in 2023. Even if you think you're on top of your game in cyber security the only constant is that the threat landscape will continue to evolve and your need to remain vigilant.
Specops Software’s cyber security expert Darren James will be covering key areas to focus your cyber security efforts in 2023 and hopefully add a few more items to your checklist for next year.
In this webinar attendees will learn:
• What to expect in 2023’s threat landscape
• How to reduce the risk of evolving phishing and ransomware attacks
• Cyber security quick wins for your business
• Q&A with Darren James – Head of IT for Specops Software -
Account Takeover in Azure's API Management Developer Portal
Thomas Stacey
API Management is a critical component of modern application development. As organizations increasingly rely on APIs to exchange data between systems, they must also consider the potential security risks that come with API usage.
In this 30 minute webinar, Outpost24’s Thomas Stacey will walk you through a vulnerability he recently discovered in Azure's API Management Developer Portal that can be exploited to perform an account takeover attack. Thomas will be exploring the various steps involved in identifying the vulnerability, disclosure and eventual release of the fix.
The following topics will be covered, followed by a Q&A session:
• Overview of Azure's APIM Service
• Identifying the vulnerability in Azure's API Management Developer Portal
• The Road to a Bug Bounty
• Conclusion and Application Security Best practiceThis webinar is ideal for developers, security professionals, and anyone interested in learning more about vulnerability discovery and understanding why manual testing is essential for application security.
-
Dark Web Trends: Credential Theft and the Traffers Ecosystem
Victor Acin - KrakenLabs Manager, Outpost24
In recent years, the theft of credentials has evolved into a highly professionalized cybercriminal activity. The number of Initial Access Brokers (IABs) skyrocketed, ransomware groups multiplied, malware prices increased, and Traffers have emerged.
In this webinar, Outpost24’s Victor Acin - KrakenLabs Manager provides a deep dive into the credential theft ecosystem and Traffers, providing best practice and encouraging organizations to evaluate their security measures against these evolving threats.
This highly informative webinar will cover the following topics, followed by a Q&A session:
• Introduction to credential theft
• Traffers ecosystem
• Conclusions
• Recommendations and best practiceThis webinar is ideal for security professionals, and anyone interested in learning more about how to protect their organisation from similar threats.
-
Securing Your Active Directory: How to Find and Block Weak Passwords
Darren James - Senior Product Manager, Simon Jones - Regional Sales Manager
Securing Your Active Directory: How to Find and Block Weak Passwords
Active Directory is the backbone of most enterprise networks and securing it is critical to protecting sensitive information. One of the weakest links in Active Directory security is weak passwords. In this webinar, we will explore how to find and block weak passwords in Active Directory to enhance your organization's security posture.
During this webinar, we will cover:
• An overview of Active Directory and why securing it is crucial.
• The dangers of weak passwords and the risks they pose to your organization's security.
• How to identify weak passwords in Active Directory
• Best practices for blocking weak passwords in Active DirectoryBy the end of this webinar, attendees will have a solid understanding of how to identify and block weak passwords in Active Directory, reducing the risk of security breaches and protecting sensitive information. Join us and learn how to secure your Active Directory!
-
Keeping your External Attack Surface Under Control
Darran Clare, Cyber Distribution, Stijn Vande Casteele, Founder at Sweepatic, Paul Wals, Sales Engineer Outpost24
You can't stop the expansion of your external attack surface, but you can identify unknown assets and their vulnerabilities to mitigate the security risk. External attack surfaces expand due to modern software development practices, mergers and acquisitions, the adoption of multi-cloud strategies and much more.
Many organizations find it difficult to monitor these changes and end up leaving themselves vulnerable to the 'unknown unknowns' - potential backdoors that can lead to a breach.
External attack surface management (EASM) is a way to discover and track external-facing assets that may be potential breach-points into your organization’s network. EASM helps organizations create an accurate inventory of their internet-facing assets and vulnerabilities before it can be exploited - the first step in effectively defending against attacks. From there, security teams can continually monitor their external attack surface and prioritize their remediation efforts.
Join our webinar - Keeping Your External Attack Surface Under Control - on Thursday 21st September at 3pm CEST to learn how modern organizations use EASM to:
• Discover shadow IT and unknown, external assets connected to your organization
• Identify common misconfigurations and vulnerabilities in exposed assets
• Score your vulnerability exposure and prioritize what needs to be fixed first
• Continuously monitor the attack surface for new vulnerabilities introduced by exposed assets or configuration changes
• Compliment vulnerability assessment and threat intelligence tools in a broader threat exposure management programAt the end of this webinar, attendees receive an invitation to a personalized evaluation of their external attack surface
-
Getting the Most Out of Your Specops Password Auditor Report
Darren Siegel, Lead IT Engineer & Nathan Johnson, Account Executive - Specops an Outpost24 Company
Please join cybersecurity expert, Darren Siegel along with Nathan Johnson as they share how you can get the most out of your Specops Password Auditor reports. They will discuss the password vulnerabilities uncovered in your results, what you should be doing about them and how often you should scan your Active Directory.
Specops Password Auditor is a free read only tool that scans your AD for over 950 million unique compromised passwords and other password vulnerabilities that could be lurking in your AD!
If you haven’t scanned your Active Directory yet you can download Specops Password Auditor here: https://specopssoft.com/product/specops-password-auditor/
Don’t let go of the security-related weaknesses related to password settings that are detected. Understand what the collected information is telling you in the display of multiple interactive reports containing user and password policy information. With multiple reports that include, a summary of accounts using compromised passwords, identical passwords, and many more you will be able to see a comparisons of your organization's password settings with industry standards and best practices according to multiple official standards.
-
What Most Orgs Get Wrong About "Never Expire"
Darren James and Liz Lockard
After attending this webinar, you’ll know:
- The numbers behind why organizations of all sizes consider removing expiry
- The things you need in place before even considering removing expiry
- Whether or not removing expiry is right for your AD environmentIs this talk right for you?
- This discussion will focus on whether or not to remove expiry for Active Directory passwords. This discussion will be the best fit you are using Active Directory in an on-prem or hybrid environment. If you are only using Azure Active Directory (or a non-Microsoft environment), this discussion will be less applicable for you.- Whether you’ve already rolled out a “never expire” project in your organization, are considering one, or want to validate it’s not the right fit for you – this webinar will help you consider how best to implement (or not) and help you consider what you may have overlooked.
Can't make it live? Register anyway to get the recording.
-
Cybercrime trends: Uncovering the latest strategies of threat actors
Vicente Martín, Senior VP of Product Outpost24 and Victor Acin, KrakenLabs Manager Outpost24
In our rapidly evolving digital era, cybersecurity is in a constant state of flux. In this webinar our threat intelligence experts will highlight the latest threat actor trends, vulnerabilities and campaigns threatening organizations today. We will provide valuable insights into the cybercrime landscape and how to protect your organization and safeguard your assets against opportunistic adversaries.
This highly informative webinar will cover the following topics, followed by a Q&A session:
- Latest trends in threat actors, vulnerabilities, and campaigns
- Anticipating shifts in the threat landscape and alert-based scoring
- Recommendations and best practice -
Crafting a Cyber Essentials Compliant Password Policy
Darren James, Senior Product Manager and Simon Jones, Account Manager from Specops Software an Outpost24 Company
Crafting a Cyber Essentials Compliant Password Policy: Everything You Need to Know
Cyber Essentials the UK government-backed scheme launched in 2014, has been helping organisations of all sizes guard against the most common cyberattacks faced in the current landscape.
Within the certification, there are various password-based authentication requirements that need to be evaluated and put in place for compliance. With over 63% of data breaches involving the use of weak, default, or stolen passwords (Verizon DBIR) mastering the password problem needs to be the foundation of any organisation's cyber defence.
We’ve put together this interactive deep-dive into how this problem can be tackled with the Cyber Essentials requirements in mind.
During the talk, we’ll cover:
• An overview of the password-based authentication requirements for Cyber Essentials certification and NCSC recommendations
• How you can easily check existing password policy compliance against Cyber Essentials / NCSC standards
• Free tools to easily identify pre-existing password security vulnerabilities in your organisation
• How 3rd party password policy tools can easily meet requirements and empower users with dynamic feedback, passphrase creation and compromised password alerts
• Any questions asked in an interactive Q&A sessionIf you want peace of mind that the password problem is covered in your organization, join us for everything you need to know about crafting the perfect Cyber Essentials-compliant password policy.
Register for the live-stream now or be alerted when its available on-demand.
-
Combatting cyber-attacks targeting your employees with password security
Darren James, Senior Product Manager, Outpost24
According to the Verizon Data Breach Investigations Report (DBIR), a staggering 63% of data breaches involve weak, default, or stolen passwords. Don't leave your organization exposed to this risk.
In this webinar, we will discuss the world of password security and equip you with essential knowledge to safeguard your workforce. You'll gain insights into preventing weak and compromised passwords and proactive strategies for defending against ransomware, phishing and social engineering.
During this webinar, we'll cover the following:
- An overview of attacks targeting your employees, including brute-force attacks, social engineering, ransomware, and phishing
- The significant dangers of weak passwords and their implications for your organization's security
- Strategies for identifying and blocking weak passwords right at the point of creation
- Best practices for proactively preventing weak passwordsRegister now and stay one step ahead of cyber criminals.
-
Tech Talk: The State of Password Security in 2024
Darren James, Sr. Product Manager and Victor Acin, Head of Threat Intel
What the Data from the 3rd Annual Specops Breached Password Report is Telling Us
Join us as Specops Software Sr. Product Manager, Darren James, and Outpost24’s Head of Threat Intelligence Operations, Victor Acin discuss what the data around passwords in the Specops annual 2024 report is telling us.
In this informal discussion, Darren and Victor will discuss and break down the data in the newly released 3rd Annual 2024 Specops Breached Password Report.
The report shares the latest research into the trends and patterns of weak and compromised passwords and how they are exploited while exposing the hidden risk of compromised passwords. Darren and Victor delve into the data around keyboard walk patterns, the strength of longer passwords, and baffling stats uncovered by the Threat Intel team for this year’s Specops Breached Password Report.
Join the discussion to hear the data insights and see how your organization can block compromised passwords, and more. Grab your copy of the 2024 Specops Breached Password Report here: https://specopssoft.com/our-resources/most-common-passwords
-
Agile Web Application Security in 2024
Thomas Stacey, Application Security Auditor at Outpost24
Join Thomas Stacey, Application Security Auditor at Outpost24 to discuss web application security and pen testing for agile development teams in 2024. We'll dive into the pros and cons of in-house versus outsourced pen testing, hybrid pen testing as a service, what to look out for in an audit in 2024 including recent findings from Tom's own pen testing, and how to best utilize automation in your org's security posture.
Tom has some fascinating findings to share including some oldie-but-goodies you shouldn't overlook.
Plus, we'll take answer your questions live in an "ask the pen tester" format.
-
Protect Your External Attack Surface: Findings and Best Practice in 2024
Stijn Vande Casteele, Founder of Sweepatic. Sergio Loureiro, VP of Product Strategy at Outpost24
This virtual workshop will provide crucial insights into the internet-facing assets of businesses that make them vulnerable to threat actors. Because you can't protect what you're not aware of, we'll guide you through the most common, yet often forgotten high-risk assets in an external attack surface, as indicated by our benchmark findings. Many organizations struggle to track and maintain an up-to-date inventory of all their external assets, making them vulnerable to potential breaches through unknown backdoors. External attack surface management (EASM) is a way to discover and track these unknown assets that may be potential breach-points into your organization's network.
During this talk, we'll present practical and effective reconnaissance techniques and show you how to proactively and efficiently control your external attack surface.
Join us on Wednesday, May 16th at 3pm, CEST to:
– Discover most common and often forgotten high-risk external IT assets
– Learn about the risks associated with an unmonitored attack surface and our benchmark findings
– Get better insights of the various methodologies and tools that keep your external attack surface under control
– Best practice to stay up-to date when securing your external attack surfaceFollowing the webinar, participants will be offered a customized analysis of their external attack surface, in reference to regional benchmark findings.
-
The Cost of Forgotten Passwords
Darren Siegel, Sales Engineering Team Lead North America
In this webinar, you will discover the significant costs associated with password resets and learn how much organizations can save by implementing a self-service password reset solution. The Specops Software team has recently did an analysis on the data showing the average savings organizations achieved in 2023 with this approach. The discussion will also cover the frequency of forgotten passwords, account unlocking, and help desk interactions, providing insights into how these factors can lead to increased efficiency and reduced operational costs.
This is an invaluable opportunity for IT professionals and decision-makers to understand the impact of efficient password management solutions and to explore strategies to enhance security while cutting costs. Don't miss out on the chance to gain expert insights and improve your organization's password security protocols. Join us to learn more about leveraging technology to benefit your business.
-
Everything you need to know about EASM and PTaaS — within CTEM framework
Laura Enriquez, Stef Geerits
External Attack Surface Management (EASM) and Pen Testing as a Service (PTaaS) provide valuable insights into a strong security plan to protect your organization. These tools contribute to key stages within the Continuous Threat Exposure Management (CTEM) approach, which protects your company’s networks, systems, and assets from cyber attacks, potential problems, and vulnerabilities - continuously.
Join our tech talk, where experts will answer common questions about the combined approach of EASM and PTaaS.
What you will walk away with:
— Understanding EASM: Dive into what EASM is, why it’s crucial for your security strategy, and its key focus areas. Even if you believe your asset inventory is complete, discover why EASM is still essential.
— Learn about PTaaS: Find out about PTaaS, how it’s different from traditional penetration testing, and why it’s important for security assessments. Discover the advantages and main features of PTaaS solutions.
— Contrasting EASM and PTaaS: Uncover the differences between these tools and verify if having both can be a good choice for your organization.
— Integrated Solutions: Explore the advantages of managing both EASM and PTaaS through a single interface, from the initial planning stages to final reporting.This webinar is designed for IT professionals, chief information security officers, business leaders, and everyone committed to improving their organization’s cybersecurity posture. Whether you’re looking to implement EASM, PTaaS, or both, this session will provide you with the knowledge to make informed decisions and implement best practices tailored to your organization.
Don’t miss this opportunity to challenge your security strategy — secure your spot today.