<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Insights Resources

Webinars

On-Demand Webinar: MITRE ATT&CK Framework with Israel Barak

The MITRE ATT&CK framework is a very effective tool for “adversary emulation,” cataloging how adversaries behave, what they’re trying to do, and the techniques used to accomplish their means. Moreover, the framework aims to provide a common language and vocabulary for practitioners, vendors, and all parties working to understand common threat actors and techniques.

Read More
Webinars

The MITRE ATT&CK framework is a very effective tool for “adversary ...

Read More
Webinars

2019 Security Predictions Webinar

In this webinar, Sam Curry, Chief Security Officer at Cybereason, talks about his predictions and the trends he sees evolving in the cybersecurity space in 2019. From IoT, mobile, and the rise of "Living Off the Land", all the way to politics and critical infrastructure, and the impact it all might have on the cybersphere, Sam speaks at length about the factors that will shape the cybersecurity landscape of tomorrow.

Read More
Webinars

In this webinar, Sam Curry, Chief Security Officer at Cybereason, t...

Read More
Webinars

Security Deep Dive: Analyst & CISO Perspectives

In this webinar, Sam Curry, CSO at Cybereason, will moderate a discussion between Cory Collins, Analyst at Mars, and Rich Rushing, CISO at Motorola Mobility. Both Cory and Rich were speakers at DEEP 2018 and will discuss learnings from the conference, struggles they face in their day-to-day jobs, and how they stay current on the ever-changing landscape.

Read More
Webinars

In this webinar, Sam Curry, CSO at Cybereason, will moderate a disc...

Read More
Webinars

Hacking the Vote: How Cyberattacks Can Impact Elections and What Companies Can Learn

Cybereason recently held a tabletop exercise to explore how cyberattacks could be used to interfere with elections. This simulation expressly forbids the hacking of electronic voting machines or voter rolls. Instead, the focus was on methods that are less obvious but equally effective: fake news, traffic jams, threats to the public’s safety and confusion around where and when to vote.

Read More
Webinars

Cybereason recently held a tabletop exercise to explore how cyberat...

Read More
Webinars

AI Hunting in Action

In this webinar Shlomi Avivi, VP of Information Security at Cybereason will show you how AI hunting is probably the best approach to deal with attacks that use advanced tools and techniques.

Read More
Webinars

In this webinar Shlomi Avivi, VP of Information Security at Cyberea...

Read More
Webinars

Jumpstarting Your Security Strategy with the NIST Framework

Right now, 30% of companies in the United States employ the NIST cybersecurity framework. In 2020, that number is set to be 50% of all companies in the US. But what exactly does the NIST cybersecurity framework entail? What makes it so popular, and how can technology help you accelerate adoption?

Read More
Webinars

Right now, 30% of companies in the United States employ the NIST cy...

Read More
Webinars

THE YEAR OF THE DEFENDER: FIVE PREDICTIONS FOR CYBERSECURITY IN 2018

Cybersecurity dominated the news cycle in 2017. There were headlines about viral ransomware, global destructive wipers posing as ransomware, leaks of spy tools from U.S. intelligence agencies, and breaches at major companies. And while there are still a couple of weeks remaining in 2017, we’re crossing our fingers and hoping that we’re done with cybermeltdowns for the year.

Read More
Webinars

Cybersecurity dominated the news cycle in 2017. There were headline...

Read More