Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The CEO's Take: The Human Element of Security

“Human error contributes to 95% of data breaches.” From unsecured collaboration channels to poor password hygiene, the attack surface of an organization extends across both its vendor ecosystem as well as all of the employees within it. Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Marc van Zadelhoff (CEO, Mimecast) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com.

Inside the Deep & Dark Web Marketplace Fueling Financial Cyber Attacks

The deep and dark web isn’t chaos—it’s a fully functioning marketplace. In this clip from Exposed: Cyber Risk in the Financial Sector and its Supply Chain, Dov Lerner explains how aspiring attackers can purchase phishing kits, stolen bank credentials, initial network access, and even cash-out services—often without technical expertise.

Why Your Attack Surface Is Bigger Than Your SOC Can See | Financial Cyber Risk Explained

Your organization’s attack surface doesn’t stop at the network—and in financial services, that reality can’t be ignored. In this clip, Dov Lerner explains why even companies with strong internal security programs remain vulnerable when attackers target customers through phishing and account takeover schemes.

How AWS Security Hub and Tines Help Security Teams Prioritize Risk and Accelerate Response

Security teams aren’t short on alerts—they’re short on clarity and time. As cloud environments grow more complex, leaders need to understand which findings represent real exposure and how to act on them quickly. In this webinar, AWS and Tines show how AWS Security Hub prioritizes risk through correlated and exposure-based findings, and how Tines turns that signal into consistent, automated action. Through real-world examples, attendees will see how teams reduce noise, speed remediation, and improve security operations with workflows that scale.

The Silent Killer in Security Stacks: Configuration Drift | Todd Graham x Garrett Hamilton

The silent killer in modern security programs? Garrett Hamilton and Todd Graham discuss how the real killer is settings quietly slipping out of alignment over time — even in environments packed with “best-in-class” tools and clean audit results. Misconfigurations don’t announce themselves. They accumulate. They age. They slowly pull your security posture away from original intent. What teams think is “turned on” often isn’t enforced consistently — or at all. Without continuous validation, drift becomes invisible risk.