3 Steps to Protect Your Organization From Digital Risks Across the Open, Deep, and Dark Web
Nick Hayes of Forrester Research and Rick Holland of Digital Shadows discuss why it is critical to monitor/manage your digital risk across the widest range of data sources within the open, deep, and dark web.
Financial Services Threat Landscape
In this webinar, we explore:
- The tactics, techniques and procedures (TTPs) we saw targeting financial services in 2016
- Developments in targeting observed in Q1, 2017
- Emerging tools and actors targeting financial services
- How to use this information to manage your digital risk
Watch this on demand webinar now.
Forecasting the 2017 DDoS Landscape
At the end of September, a Hackforums user, going by the alias “Anna_Senpai” posted a link to source code for an Internet of Things botnet called Mirai. Since this botnet was made public, it has been reportedly used in in a multitude of large DDoS attacks on a variety of organizations.
“Mirai” translates from Japanese to “the future.” In this webinar, Digital Shadows forecasts the DDoS threat landscape for 2017. We look beyond the noise created by Mirai and give an overview of adversaries' motivations, scenarios we are likely to see in 2017, and tips for how organizations can best face these threats.
Building a Strategic Threat Intelligence Program
Learn how to build and implement a strategic threat intelligence program that goes beyond traditional threat intelligence feeds. Rick Holland, VP of Strategy at Digital Shadows and Mike Rothman, President & Analyst at Securosis discuss in this on-demand webinar.
A Complete Perspective On Your Threats
Listen on demand to Digital Shadows and ThreatConnect to learn how you can achieve an unmatched, 360-degree view of the threats and vulnerabilities that can make your organization susceptible to costly cyber attacks and business disruptions.
Gain an Attacker’s Eye View
Join guest speaker Rick Holland from Forrester, and Digital Shadows co-founder and CEO Alastair Paterson, as they discuss how to leverage cyber situational awareness to view your organization as an attacker would and adjust your security posture to protect your critical data.