Security | Threat Detection | Cyberattacks | DevSecOps | Compliance


I Get Paid to Hack Your Company and These Are the Controls I Hate the Most!

Carlos García and Jeff Macko, two leading security experts from Kroll, provide a unique perspective on hacking and how to address it in this insightful webinar, I Get Paid to Hack Your Company and These Are the Controls I Hate the Most! The session outlines the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.

The Difference Between Cybersecurity and Ethical Hacking

Ethical hacking is a field within cybersecurity where security experts assume the role of an unauthorized user and attempt to gain access to a private network or computer. These exercises aim to help targets identify any security vulnerabilities that could be exploited in a real cyberattack. Cybersecurity professionals utilize non-invasive methods, such as risk assessments, audits, and security questionnaires, to discover security risks.

The Financial Industry's Biggest Threat

Losing money to cybercriminals is the financial industry's biggest threat today. Billions of dollars have been lost in 2022 alone due to cyber security incidents. This money is unrecoverable and can be blamed on one thing - poor cybersecurity practices. The money goes straight to the pockets of hackers so they can build bigger and better ways to hack and steal our money.

What is Ethical Hacking? Working, Techniques and Jobs

In the past, if someone called themselves hacker chances are, they received some backlash or negative connotations. However, in recent times as the field of information is on the rise a new term ‘Ethical Hacking’ has emerged and opened many different avenues for IT and cyber security professionals.

The role of attack surface management to bolster data breach protection

The attack surface is an organization’s digital exposure that an attacker could exploit to get unauthorized access to a system and extract data or other sensitive information. It could also be used as a point within a chain of attacks. As Organizations increasingly rely on SaaS services and products, the digital attack surface is more than the firewall and network.

Webinar: "I get paid to hack your company and these are the controls I hate most!"

Drawing on over three decades’ experience in penetration testing for global organisations of all sizes, this webinar outlines some of the most common attack methods in use today and shares effective approaches for tackling them. The session on will detail the most effective security controls to prevent and mitigate common types of cyber-attacks.

A Problem Like API Security: How Attackers Hack Authentication

There is a sight gag that has been used in a number of movies and TV comedies that involves an apartment building lobby. It shows how people who don’t live there, but who want to get in anyway, such as Girl Guides looking to sell cookies to the tenants – simply run their fingers down every call button on the tenant directory, like a pianist performing a glissando, knowing that at least one of the dozens of apartments being buzzed will let them in simply out of reflex or laziness.