deepak

Navigating Global Public Web Server Privacy Laws

Protecting customer’s data privacy has become a new source of stress for any company with a web presence. Compounding that, international trade requires compliance with international privacy laws regarding the collection, storing, and use of personal information to avoid fines that can add up to millions of dollars. In this presentation we will compare privacy …

Navigating Global Public Web Server Privacy Laws Read More »

Five Ways Attackers Leave Ransomware Vulnerable to Detection

One Minute Highlight Clip Full 36 Minute Session Five Ways Attackers Leave Ransomware Vulnerable to Detection Ransomware has evolved and time may not be on your side. Once inside, adversaries are acting faster, moving laterally to accumulate enough data to ensure that you will pay—but intruders following the ransomware playbook have needs that cause them …

Five Ways Attackers Leave Ransomware Vulnerable to Detection Read More »

Cybersecurity over the horizon: the future of cybersecurity

We welcome attendees to examine in an interactive session the latest cybersecurity trends and their implications for organizations facing new and emerging cyber risks and threats. Cybersecurity has always been a never-ending race, but the rate of change is accelerating. Companies are continuing to invest in technology to run their businesses. Now, they are layering …

Cybersecurity over the horizon: the future of cybersecurity Read More »

Remaining Ransom Aware: What to Do When One Gets Past the Goalie

Remaining Ransom Aware Ransomware, among the most intimidating threats on today’s security horizon, is an issue best approached from a “not if but when” perspective. It’s no longer enough to bolster your defenses. Today’s CISO should know what to do when one gets past the goalie. We’ll discuss: Defensive practices for those hoping to avoid …

Remaining Ransom Aware: What to Do When One Gets Past the Goalie Read More »

Building a Modern SOC Requires Attack Surface Validation

Sam Harris, Stratascale Building a Modern SOC Requires Continuous Attack Surface Validation: The Modern SOC requires continuous validation of the attack surface to understand what threats exist, how those threats change every day, and the impacts they may cause. Protecting your enterprise from breaches and bad guys in the cloud era means staying several steps …

Building a Modern SOC Requires Attack Surface Validation Read More »

Security Leaders Use Ranges & Simulation to Improve Their Security Posture

Would you board a plane if you knew the pilot got all As in flight school? Probably yes, but what if you learned that the pilot got all “A”s , but this was their first time actually flying a plane, and that they never went through any flight simulation training? You’d likely turn around and …

Security Leaders Use Ranges & Simulation to Improve Their Security Posture Read More »

Scroll to Top