Archive | Webinars RSS feed for this section
cyber-workforce.preview

Webinar Replay: Network Threat Hunting Part 3 – Success

The last part of the Network Threat Hunting series will address key factors for success as well as potential categories of tools which can help ensure that your Network Threat Hunting operations are successful. Presenters: Mike Meason, Managing Partner, Deep 6 Security, LLC Trae Norman, Partner, Deep 6 Security, LLC Presented By Deep 6 Security, […]

Continue Reading
configuring-pc12

Webinar Replay: Network Threat Hunting Part 2 – Analysis

The second in a three part series of webinars dedicated to Network Threat Hunting Capabilities. This discussion focuses on the level of knowledge, skills, and abilities required as well as approaches for analysis activities associated with Network Threat Hunting capabilities. The discussion will address KSA’s associated with infrastructure and other systems as well as illustrative […]

Continue Reading
0,,15028598_1,00

Webinar Replay: Network Threat Hunting Part 1 – Visibility

The first in a three part series that explores high level requirements for utilities to have successful Network Threat Hunting capabilities. Part I (Visibility) begins the conversation around what are the prerequisites for developing network based threat hunting capabilities. The webinar will explore basic requirements for visibility, acquisition, scope, positioning, and operations that support network […]

Continue Reading
iStock_000018426636Medium

Webinar Replay: A Smarter Approach to Supplier Risk Management for the Energy Industry

Governing and managing supply chain security continues to be more complex and significant given all of the new regulations, technologies and standards. With FERC Order 829 requiring a new CIP supply chain security standard and the Standards Development Team working on what that order will look like, now is the time to improve your supply […]

Continue Reading
Lock+data

Webinar Replay: Empowering a Small Security Team to Act Proactively

Traditionally viewed as weaker prey with valuable assets, small security teams are often the targets of today’s sophisticated cyber criminals. Major attacks have the potential to overwhelm and even cripple smaller teams, jeopardizing the security of their organization’s vital corporate assets. Lean security teams have to completely reevaluate the way they approach security as cyber-attacks […]

Continue Reading
Page 1 of 912345...Last »