Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Webinar Replay - AI Security Testing: Prompt Injection Everywhere

Kroll’s LLM penetration testing has seen it analyze data sets of OpenAI models, non-public models and RAG systems. It has used this to produce an anonymized dataset that catalogs vulnerabilities from all LLM engagements. Kroll has found a worrying prevalence of prompt injection attacks in the LLM cases it has investigated and shares its findings in this briefing.

Ransomware as a Business with Ken Westin from LimaCharlie

Ken Westin, Senior Solutions Engineer at LimaCharlie, joined us for Defender Fridays to discuss Ransomware as a Business. Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry.

Must-Know Strategies for DORA Compliance

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anna Delaney, Director of Productions at Information Security Media Group (ISMG), to explore why the Digital Operational Resilience Act (DORA) makes operational resilience a priority for financial services organizations. They discuss how DORA will impact your financial institution, how to best prepare for DORA and improve operational resilience, and how to increase oversight and accountability of third parties in the supply chain.

Organizational Resiliency in Healthcare: Preparing for System Downtime #shorts #healthcare

Building organizational resilience is critical in healthcare. But it's not just about preventing cyberattacks—it's about ensuring patient care continues even when systems go down. Practicing cyber resilience through well-defined downtime procedures and understanding the critical outcomes for patients is essential. As Anahi Santiago, Chief Information Security Officer at ChristianaCare, emphasizes, knowing the path to achieve these outcomes, even in a crisis, is key to maintaining high standards of care.

Secure Cloud Access with Wiz & CyberArk: Enhance Multi-Cloud Security at Cloud Speed | CyberArk

Discover how the powerful integration between Wiz and CyberArk enhances cloud security by identifying and controlling excessive cloud privileges. In this demo, you'll see how Wiz flags risky access, while CyberArk applies just-in-time privileged access for secure administrative operations in multi-cloud environments. By leveraging the principle of least-privilege, CyberArk's Secure Cloud Access ensures all sessions are monitored for compliance and audit without slowing down your cloud development.