Security and Privacy: How to grow the relationship
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
Your Practical Guide to Reducing Digital RiskGet Your Copy!
Other content in this Stream
Live Webinar Apr 8: Operationalizing Alerts: The Problem with Sitting in Triage
In this webinar, we will outline how organizations use dedicated playbooks to significantly reduce the amount of time it takes to action and respond to incidents.
Live Webinar Apr 16: Threat Model of a Remote Worker
CISO Rick Holland and Information Security Director Isidoros Monogioudis will share their thoughts on the remote worker threat model in this live webinar.
Beware of Phishers: New Research into the Ecosystem of Phishing
In this upcoming webinar, Harrison Van Riper and Alex Guirakhoo walk through the Ecosystem of Phishing. The team will cover New phishing data findings, How cybercriminals are crafting and distributing
Iranian Cyber Threats: Practical Advice for Security Professionals
Rick Holland and Harrison Van Riper sit down to walk through Rick's latest blog on advice around the Iranian cyber threats.
Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 8
Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.
The Cybercriminal Forum is Not Dead | Recorded Webinar
With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums
Typosquatting and the 2020 U.S. Presidential election
Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains
Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division
The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.
Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar
Hear from Marc Crudgington, CISO at Woodforest Bank, about the innovative programs he’s put in place to protect his IT infrastructure with a limited staff.
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
Hear about the shifting regulatory landscape and the growth in breach notification legislation, including practical guidance on how and when to notify customers and authorities.
How to Reduce Your Extortion Risks: Avoiding the Shakedown
In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r
Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar
In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Taking a Threat Centric Approach to Managing Digital Risk in APAC Webinar
By attending this session, you'll learn how threat actors and campaigns are leveraging exposed data, what digital risk and online exposure looks like, and how to efficiently manage digital risk. Resou
Mitigating the Top 7 Dark Web Threats to Your Enterprise
oin us for us for an informative session on the 7 most prolific threats on the dark web and strategies to harden your defenses to prevent becoming a victim.
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
The Need for Digital Risk Protection - Digital Shadows and Digital Logistix