This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.
Bridging the Gap: Communicating Cyber Risk to Executive Boards
McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
The Human Side of Security: Building Trust and Influence as a CISO
Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
Beyond the Technical: Balancing Art and Science in Modern Red Teaming
Managing SaaS Sprawl: Building Effective Security in a Multi-Vendor World
Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.
Leadership that Empowers: Building High-Performance Security Teams
Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.
Testing LLM Algorithms While AI Tests Us
The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.
Cyber Resilience: Tactics for Post-Attack Recovery
Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.
Mitigate Third-Party Risks by Strengthening Security Foundations
Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.
Penetration Testing: Navigating PCI DSS Compliance
Join our webcast with Derek Rush, Managing Senior Consultant II, as we explore achieving PCI DSS compliance using targeted penetration testing. Discover vital strategies for securing payment environments against cyber threats through tests on applications, networks, and cloud services.
How Does Social Engineering Work? From Planning to Execution
Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.