Videos

Watch our videos to learn more about digital risk management.

  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • ×

    150k+ subscribers stay ahead of digital risks.

    - Join Them -

    Sign up for threat intel and security updates:

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar55:16

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar

    Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data,

    Watch Video
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar34:22

    Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar

    The cyber talent gap is posing big challenges to enterprises and requires that security leaders implement innovative strategies to bridge the gap. During this informative session, you’ll learn from Ma

    Watch Video
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Photon Demonstration of Muraena2:46

    Photon Demonstration of Muraena

    Digital Shadows' Photon Team configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox usi

    Watch Video
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows2:41

    ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows

    CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.

    Watch Video
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar50:58

    Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar

    The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting

    Watch Video
  • How to Reduce Your Extortion Risks: Avoiding the Shakedown44:53

    How to Reduce Your Extortion Risks: Avoiding the Shakedown

    In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r

    Watch Video
  • Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar46:49

    Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar

    In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni

    Watch Video
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar35:26

    Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar

    By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou

    Watch Video
  • Digital Shadows and Splunk Integration1:01

    Digital Shadows and Splunk Integration

    Digital Shadows SearchLightTM integrates with Splunk Enterprise and Splunk Enterprise Security, enabling security teams to correlate alerts, ingest the latest threat intelligence, and gain real-time c

    Watch Video
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • The Need for Digital Risk Protection - Digital Shadows and Digital Logistix30:44

    The Need for Digital Risk Protection - Digital Shadows and Digital Logistix

    Introducing Digital Shadows, the leader in digital risk protection. Today’s cybersecurity landscape is perimeter based and tends to focus on traditional security at the endpoint, firewall and network.

    Watch Video
  • loading
    Loading More...