ThreatConnect & The Decisive Group Q&A

In this Q&A ThreatConnect will cover the evolution of security operations and the increasing importance of threat intelligence operations to help enterprises become more proactive in defending their increasing attack surface.

Read more

From the Field – Stories of Successfully Detecting Cyber Attacks

We often hear the attackers are successful, the company has been breached and data has been stolen or held ransom. We hear when the defends beat the attackers! In this session hear from two leaders in Cyber Security talk real world examples of the defenders defeating the attackers. You will hear from Stephan Jou, CTO […]

Read more

The (Hard) Key to Stop Phishing: How Cloudflare Stopped a Targeted Attack and You Can Too

In July 2022, Cloudflare was targeted in a sophisticated SMS phishing scheme in such a way that we believe most organizations would be likely to be breached. In this session we’ll detail the recent targeted phishing attack we saw at Cloudflare and more importantly, how we stopped it and steps you can take to protect […]

Read more

The Agent of Influence

In a world of media chaos and disinformation, how do you differentiate truth from lies? How do you choose your sources of information? Never before have nation-states had a tool as far-reaching as the internet to tell stories, spread messages, and deceive friends and foes alike. Today, over 95% of Canadians and Americans are connected […]

Read more

Ransomware IR Playbook to Remember & an Art of Building Resilience

The rise of ransomware and other tactics for cyber criminals over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. […]

Read more

A Data Product Approach to Reducing Security Debt

Securing code at each point in the software development lifecycle is never-ending work. Development and security teams need a way to determine what’s vulnerable, understand how to fix it and be able to scale that work as their threat landscape evolves. But what does that really mean in a world where software development moves at […]

Read more

Report: Protecting Customer Identity and Access Management (CIAM) Services Against Online Threats

Today’s companies must enable their customers to engage with their apps or services at any time, from any device, in a secure and safe manner. While the importance of identity within an organization’s security posture has been clear for many years, the digital rush has accelerated timeframes by dissolving security perimeters with unprecedented swiftness. As […]

Read more

Defending Ukraine: Early Lessons from the Cyber War

Microsoft’s efforts to aid Ukraine’s response to Russia’s attacks are tied to our commitment to security, defence of democracy, and protecting people. Join us for this session to learn how our threat intelligence and security teams are working closely with the government of Ukraine and other partners to protect organizations and citizens. Protection against cyber-attacks […]

Read more

How Safe is Your Cloud? Deciphering Cloud Threats and Security Models

The cloud is here and growing. Securing the cloud isn’t the same as securing on-premise deployments. According to recent Elastic research, 1-in-2 CISOs expect misconfigurations to be a leading cause of breaches, while an ESG research highlights that 89% of negative outcomes occur between detection and investigation. In this session James Spiteri, Product Marketing Director […]

Read more

The Unsung Hero of Cybersecurity: Taking Your Vulnerability Management Program (VMP) from Good to Great

Feedback from Canadian organizations in the 2022 TELUS Canadian Ransomware Study highlighted the importance of having a comprehensive Vulnerability Management Program (VMP) in order to defend against ransomware. Today, approximately 50% of Canadian organizations have a formal VMP in place, but how can these organizations take their programs from good to great? Join Kim Schreader, […]

Read more

The Compelling Case for Zero Trust: Bridge the Gap Between Cybersecurity and Business

At a time when work was still a place to go to, apart from a thing to get done, organizations could afford to protect their most sensitive data using firewalls, IDS and IPS systems, and VPNs. But today, when there are no corporate network boundaries, and data can be stored and accessed from anywhere, traditional […]

Read more

Cybersecurity Insurance: Where to Start & How to Qualify

The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent. In this upcoming session with Chris Hills, Chief Security Strategist at BeyondTrust hear […]

Read more

How 2FA is Circumvented

Discover how vulnerabilities, misconfigurations, and lack of security awareness could lead to successfully social engineering. This talk will discuss: Vulnerabilities – If left unpatched lead to risks Misconfigurations – Exposing users or public endpoints without 2fa Session theft – Session stealing through phishing or post-exploitation (e.g. dumping chrome cookies) Social engineering – Repeatedly spamming users […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!