Watch our videos to learn more about digital risk management.
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar
The cyber talent gap is posing big challenges to enterprises and requires that security leaders implement innovative strategies to bridge the gap. During this informative session, you’ll learn from Ma
Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
Learn More About Digital Shadows SearchLight™Learn More
Demonstration of Muraena
We configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox using capabilities built into
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows
CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.
How to Protect Your Brand Online with Digital Shadows SearchLight™ - Video
With SearchLight, organizations register their brand names, web domain names, social media handles, and official mobile applications as assets for digital monitoring. Through the SearchLight portal, w
How to Detect Data Loss with Digital Shadows SearchLight™
Detect exposed credentials, sensitive documents, proprietary code, intellectual property, and customer data. Learn more at https://www.digitalshadows.com/digital-risk-solutions/data-loss-detection/.
How to Reduce Your Attack Surface with Digital Shadows SearchLight™
Manage your attack surface and reduce the ways that an attacker can target your organization. SearchLight continually monitors for exploited vulnerabilities on your infrastructure, weak or expiring ce
Digital Shadows Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting
How to Reduce Your Extortion Risks: Avoiding the Shakedown
In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r
Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar
In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Mitigating the Top 7 Dark Web Threats to Your Enterprise
The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p
Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar
By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou
Digital Shadows and Splunk Integration
Digital Shadows SearchLightTM integrates with Splunk Enterprise and Splunk Enterprise Security, enabling security teams to correlate alerts, ingest the latest threat intelligence, and gain real-time c
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
Digital Shadows Shadow Search™ Demo
Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour