Skip to Content

Archives: On-Demand Webinars

From Deal to Defense: Unifying Cybersecurity Post-M&A
SOC Talk: Proactive Defense, Positioning Your IR Team for Success
Best Practices to Unleash the Power of Threat Hunting in Your Organization
SOC Talk: Weaponizing Security Metrics for Improved SecOps
SOC Talk: Arm Your Team for a Zero-Day Crisis
Breaking Coverage: MOVEit Vulnerability
A Threat Detection Journey: Extending Your DIR
Protecting and Securing Cloud Environments
The Modern Security Portfolio: The Toolset Organizations Need Now
Ransomware: Best Practices for Prevention, Mitigation, and Recovery
SOC Talk: Security Metrics That Matter
Optimizing Security & Costs in Multi-Cloud Environments
SOC Talk: Turbocharge the Power of Microsoft Sentinel
SOC Talk: Keeping Black Friday Cyber Threats at Bay
Securing Business Entities: Mitigating Cybersecurity Risks from Due Diligence to Integration
The SecOps Challenge and How to Face It featuring ESG
SOC Talk Beyond the Tabletop: Simulating the Adversary
Forrester: The Current State and Future Trends of Security Operations
GreyMatter Q3 2022 Product Enhancements
SOC Talk: Detection, Investigation and Response in a Cloud-Based World
SOC Talk: Integrating Threat Intelligence for Higher-Fidelity Detection and Response
Safeguard Your Financial Organization by Reducing Cyber Risk
SOC Talk: Safeguard Your Financial Organization by Reducing Cyber Risk
Securely Migrate to and Protect Your Google Cloud Platform Environment
SOC Talk: Securely Migrate to and Protect Your Google Cloud Platform Environment
SOC Talk: Securely Migrate to and Protect Your Microsoft Azure Environment
SOC Talk: Securely Migrate to and Protect Your Microsoft Azure Environment
SOC Talk: Securely Migrate to and Protect Amazon Web Services Environments
SOC Talk: Securely Migrate to and Protect Amazon Web Services Environments
Panel Discussion MDR
Three critical tenets for effective Managed Detection and Response
SOC Talk Webinar - Visibility is Key
SOC Talk: Visibility is Key – What You Need to Know About Cloud Migrations and Security
SOC Talk - On Demand - Log4j vulnerability
SOC Talk: Hunting and Mitigating the Log4j Vulnerability
Optimizing Threat Intelligence to Maximize Incident Response
SOC Talk: Optimizing Threat Intelligence to Maximize Incident Response
Metrics that Matter Webinar
Metrics that Matter – Driving Actionable Evaluation of Your Security Program
SOC Talk
SOC Talk: Leveraging Managed Services for Proactive Detection and Response
Webinar Ponemon Report
Webinar: New Report Findings – Making Security Possible and Achieving a Risk-oriented Security Posture
EMEA Cybersecurity Complexity Research Survey
Study Results On-Demand Webinar: 2021 EMEA Cybersecurity Complexity Research Survey
SOC Talk
SOC Talk: Getting Ahead of the Kaseya Ransomware Attack
Tackling Security in Hybrid and Multi-Cloud Environments with Confidence
Overcoming Major Factors Hindering the Cybersecurity Process
Overcoming Major Factors Hindering Cybersecurity Progress
Watching the Watchers: Identifying & Responding to Insider Threats
Successfully Communicating Across the Business: The Secret to Influential CISOs
The CISO’s Guide to Metrics that Matter to the Board
Security Skill Wars: Know When Your Team Needs Help with VMware Carbon Black
Beyond Response: Leveraging Automation Across the Cyber Lifecyle for IT and Security
Threat Hunting
Are You Really Hunting? Developing and Implementing a Threat Hunting Methodology
Accelerating Incident Response: Developing and Automating a Cyber Analysis Methodology
Migrating to the Cloud? Here Are Three Essential Security Requirements
Securing Your Newly Remote Workforce CISO Panel
How to Identify & Address Risk with Attack Simulation
The Most Effective Security Metrics for the Changing Risk Landscape
Leveraging Automation to Secure Your Remote Workforce
New Remote Risk Factors: Increasing Visibility Across your Cloud and SaaS Applications
Is Your SOC Ready to Secure a Remote Workforce? Detecting and Responding in a Remote World
Linking, Orchestrating, and Managing Your Enterprise Security Systems
3 Proven Methods for Implementing a Continual Threat Hunting Program
Strategies for Overcoming the Visibility Gap in InfoSec