Attend one of our upcoming live webinars or watch a previous one on-demand.
Streamline Response with Threat Intel & SOAR
Join Digital Shadows CEO, Alastair Paterson, and Palo Alto VP of Product, Rishi Bhargava, as they discuss the best practices for embedding threat intelligence into your SOC.
Shaping Your Response to the Russia-Ukraine War
Join Digital Shadows’ CISO Rick Holland and the Photon Intelligence Team to understand what cyberattacks are stemming from this conflict and how best to prepare for them.
The Not-So-Obvious Reasons Your Networks May Be Exposed
Forecasting the 2022 Ransomware Threat
Digital Shadows CISO, Rick Holland will introduce a Structured Analytic Technique called "The Cone of Plausibility" and use this analytic technique to forecast next year's ransomware threat.
Vulnerability Intelligence: Do You Know Where Your Flaws Are?
Join Photon CTI analysts to discuss the most severe vulnerabilities observed in 2021 and how to improve your security posture.
Digital Risk Protection in a Modern Threat Landscape
This Webinar highlights the key research findings of the SPARK MATRIX Digital Risk Protection (DRP), 2021.
Cybersecurity for a Small Business: Latest Threats
Ryan Floyd, venture capitalist and co-founder Storm Ventures, talks about the latest cybersecurity threats you should be aware of with Digital Shadows CEO, Alastair Paterson.
SecureWorld - Ransomware in 2021: 31 Leak Site, 2600 Victims
Detecting Exposed Data Online
Join Digital Shadows to learn about best practices for detecting exposed data across online.
Ransomware in 2021: 31 Leak Sites, 2,600 Victims
Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses.
Impersonating Domains: Breaking Research and New Functionality
This webinar covers the latest research into impersonating domains and provides a demo of SearchLight’s industry-leading domain monitoring capabilities.
Cybercrime Takeaways from the Verizon DBIR
Rick Holland and Sean Nikkel join Phil Langlois and the team behind the Verizon DBIR to understand some of the key cybercrime takeaways for organizations.
Dark Web Monitoring: Best Practices and Use Cases
Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring, fraud, and insider threat monitoring. If securit
Operationalizing Cyber Threat Intelligence with SearchLight
Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence.
Initial Access Brokers: A Deep Dive
Initial Access Brokers: A Deep Dive - Webinar Feb 2021
SearchLight and Azure AD: Auto Validate Exposed Credentials
2021 Cybersecurity Forecasts: Trends and Predictions For the New Year
In this session, Digital Shadows will share their insights and assessments into what we can expect to see in 2021.
Ransomware Trends in Q3
In this session, Digital Shadows will analyze and expand on reported ransomware attacks and delve into how security teams can strengthen their operations.
Demystifying the Dark Web - Digital Shadows Webinar
The dark web is a mysterious unknown for many organizations. Unfortunately, gaining visibility into these locations is extremely challenging. Hear this informative session on mitigating risks...
Webinar: Understanding the Risk of Exposed Access Keys
In this webinar, attendees will learn about Digital Shadows' most recent research into exposed access keys, as well as the solutions available for security teams to gain this visibility.