Videos

Watch our videos to learn more about digital risk management.

  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Digital Risk Protection and Cyber Threat Intelligence2:13

    Digital Risk Protection and Cyber Threat Intelligence

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Online Brand Security - Digital Shadows SearchLight™1:28

    Online Brand Security - Digital Shadows SearchLight™

    With SearchLight, organizations register their brand names, web domain names, social media handles, and official mobile applications as assets for digital monitoring. Through the SearchLight portal, w

    Watch Video
  • Data Loss Detection - Digital Shadows SearchLight™1:27

    Data Loss Detection - Digital Shadows SearchLight™

    Detect exposed credentials, sensitive documents, proprietary code, intellectual property, and customer data. Learn more at https://www.digitalshadows.com/digital-risk-solutions/data-loss-detection/.

    Watch Video
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Attack Surface Reduction - Digital Shadows SearchLight™1:20

    Attack Surface Reduction - Digital Shadows SearchLight™

    Manage your attack surface and reduce the ways that an attacker can target your organization. SearchLight continually monitors for exploited vulnerabilities on your infrastructure, weak or expiring ce

    Watch Video
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar50:58

    Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar

    The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting

    Watch Video
  • How to Reduce Your Extortion Risks: Avoiding the Shakedown44:53

    How to Reduce Your Extortion Risks: Avoiding the Shakedown

    In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r

    Watch Video
  • Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar46:49

    Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar

    In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni

    Watch Video
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar35:26

    Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar

    By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou

    Watch Video
  • Digital Shadows and Splunk Integration1:01

    Digital Shadows and Splunk Integration

    Digital Shadows SearchLightTM integrates with Splunk Enterprise and Splunk Enterprise Security, enabling security teams to correlate alerts, ingest the latest threat intelligence, and gain real-time c

    Watch Video
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • The Need for Digital Risk Protection - Digital Shadows and Digital Logistix30:44

    The Need for Digital Risk Protection - Digital Shadows and Digital Logistix

    Introducing Digital Shadows, the leader in digital risk protection. Today’s cybersecurity landscape is perimeter based and tends to focus on traditional security at the endpoint, firewall and network.

    Watch Video
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • How ADP Manages 3rd Party & Supply Chain Risk57:25

    How ADP Manages 3rd Party & Supply Chain Risk

    Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.

    Watch Video
  • Security Analyst Spotlight Series: Christian Rencken5:42

    Security Analyst Spotlight Series: Christian Rencken

    In this series, we bring our analysts out of the shadows and into the spotlight, showcasing their expertise and interests so you can learn a bit more about a “day-in-the-life” of a Digital Shadows Int

    Watch Video
  • ERP Applications Under Fire: How Cyber Attackers Target the Crown Jewels0:46

    ERP Applications Under Fire: How Cyber Attackers Target the Crown Jewels

    https://info.digitalshadows.com/ERPApplicationsUnderFire-Youtube.html The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals a

    Watch Video
  • loading
    Loading More...