Videos

Watch our videos to learn more about digital risk management.

  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar34:22

    Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar

    The cyber talent gap is posing big challenges to enterprises and requires that security leaders implement innovative strategies to bridge the gap. During this informative session, you’ll learn from Ma

    Watch Video
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Demonstration of Muraena2:46

    Demonstration of Muraena

    We configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox using capabilities built into

    Watch Video
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows2:41

    ISO27001 certification - Interview with CISO Rick Holland of Digital Shadows

    CISO Rick Holland is interviewed around Digital Shadows' ISO27001 certification. This is an important compliance milestone for our customers.

    Watch Video
  • How to Protect Your Brand Online with Digital Shadows SearchLight™ - Video1:28

    How to Protect Your Brand Online with Digital Shadows SearchLight™ - Video

    With SearchLight, organizations register their brand names, web domain names, social media handles, and official mobile applications as assets for digital monitoring. Through the SearchLight portal, w

    Watch Video
  • How to Detect Data Loss with Digital Shadows SearchLight™1:27

    How to Detect Data Loss with Digital Shadows SearchLight™

    Detect exposed credentials, sensitive documents, proprietary code, intellectual property, and customer data. Learn more at https://www.digitalshadows.com/digital-risk-solutions/data-loss-detection/.

    Watch Video
  • How to Reduce Your Attack Surface with Digital Shadows SearchLight™1:20

    How to Reduce Your Attack Surface with Digital Shadows SearchLight™

    Manage your attack surface and reduce the ways that an attacker can target your organization. SearchLight continually monitors for exploited vulnerabilities on your infrastructure, weak or expiring ce

    Watch Video
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar50:58

    Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar

    The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting

    Watch Video
  • How to Reduce Your Extortion Risks: Avoiding the Shakedown44:53

    How to Reduce Your Extortion Risks: Avoiding the Shakedown

    In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r

    Watch Video
  • Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar46:49

    Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar

    In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni

    Watch Video
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar35:26

    Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar

    By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou

    Watch Video
  • Digital Shadows and Splunk Integration1:01

    Digital Shadows and Splunk Integration

    Digital Shadows SearchLightTM integrates with Splunk Enterprise and Splunk Enterprise Security, enabling security teams to correlate alerts, ingest the latest threat intelligence, and gain real-time c

    Watch Video
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • loading
    Loading More...