Remove InfoSec Remove Technology Remove Workshop
article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).

CISO 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This Mental Health Awareness Month, Cyber Resilience Starts Within

SecureWorld News

Add in long hours, under-resourced teams, and the "always-on" pressure of digital defense, and it's no wonder burnout is a looming threat within the InfoSec community. CISOs and their teams operate in a high-stakes environment where every misstep can result in breach headlines, financial loss, or reputational damage.

CISO 84
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

As the global leader in Managed Security Services, Herjavec Group has demonstrated the innate ability to combine the power of technology, AI, and automation with human intelligence to optimize the IT security monitoring, incident detection, and incident response times of enterprises globally. HG Mana ged Detection & Response (MDR) .

InfoSec 52
article thumbnail

Here for Change: 12 Groups Supporting Women in Cybersecurity

Cisco Security

This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a more secure world for everyone. Women in Technology (WIT): Cyber Security & Technology Special Interest Group (Cyber & Tech SIG). The Diana Initiative.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

With technology advancements and improved feature sets, including products like Cisco’s Secure Endpoint Premier with SecureX Threat Hunting puts threat hunting well within the reach of all companies, no matter the size or security maturation level they have already achieved. Attend a Threat Hunting Workshop. Beers with Talos Ep. #97:

Risk 128
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

For strategic guidance and access to hands-on labs, register for one of our free Zero Trust Workshops. You’ll learn how to build a zero trust strategy and install and configure Duo, Umbrella, and other Cisco zero trust technologies. Or, download our white paper How to go from MFA to Zero Trust.