Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Balancing Cybercrime Incident Response: Forensics vs. Business Priorities

In today's digital landscape, incident response is a critical aspect of cybersecurity. However, achieving the right balance between conducting extensive forensics and addressing pressing business concerns is vital. Join us in this enlightening video as we explore the complexities of handling security incidents and uncover the reality that often differs from the traditional view of cyber attacks.

Secure Features, Sales Soar | A CPO's Take on Application Security | Marcelino M. (CPO, Stream)

In this episode, Marcelino Moreno (CPO, Stream) shares with Venkatesh (Venky) Sundar how product managers can contribute to an organization's growth by baking in security into the product roadmap. He also shares how a product manager can influence engineering teams to prioritize vulnerability patching along with building features to ensure that the customers use a secure product. Key highlights from the discussion.

Anatomy of Ransomware Attack: Preventing Attacks on Your Backup Infrastructure

Featuring industry experts, CTOs Danny Allan from Veeam, Sagi Brody from Opti9, and cybersecurity expert Guy Mizrahi, CEO of CyPROS. Gain invaluable insights into the ever-evolving world of ransomware attacks and learn how you can fortify your Veeam installations with the cutting-edge AI-powered anomaly detection tool, Observr.

How I got Phished in my First 30 Minutes

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.

What Happens When Someone Makes a Security Mistake?

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.

Using Generative AI for Creating Phishing Sequences

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.

How to Build Security Trust and Not Break It

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.

Using the Right Security Behaviours at the Wrong Time

Discover:✅ Why even the savviest individuals struggle to avoid phishing traps, especially amidst multiple software sign-ups and cloud managed services. ✅ From an organisation's standpoint, why acknowledging and reporting phishing attempts, like John's simulated case, is a crucial step towards better security.