Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOC 2 Type 1 vs. Type 2

Every company that decides to go through SOC 2 certification has to decide whether to pursue a Type 1 or Type 2 audit. This video will help you quickly understand which of the two types is best for your company. Would you like to become audit ready in 12 weeks, rather than 12 months? Check the box compliance is out. Revenue generating compliance is in. Learn more about Kintent.

Reducing vulnerability noise with Sysdig

Reduce vulnerability noise by up to 95%, and focus on what matters with Sysdig. If you feel overloaded with vulnerabilities from container images, then you’re not alone! It's common for DevOps teams to spend hours scrolling through hundreds of vulnerabilities even when just a small fraction poses a real risk. So how do you focus on the vulnerabilities that really matter? Sysdig Secure automatically prioritizes the vulnerabilities that are tied to packages exposed at runtime. Filtering thousands of overwhelming alerts down to only the critical ones that you should spend your time on!

The Impact of New Federal Banking Regulation

Let’s talk about the new federal bank regulation that goes into effect in April 2022. It will require organizations to notify about a breach within 36 hours, which is the shortest breach notification reporting requirement of any law to date. The clock starts ticking when the organization determines that an incident has occurred. A serious computer incident is usually defined as an incident that materially disrupts or degrades the performance of an organization.

Coffee Talk with SURGe: 2022-APR-19 MS-RPC Vulnerability, Lazarus, Pipedream

This week Audra Streetman, Ryan Kovar, and Mick Baccio from Splunk discussed the latest security news, including the MS-RPC vulnerability CVE 2022 26809, a CISA alert about the North Korean state-sponsored Lazarus Group, and Sunday's 60 Minutes episode on the threat of Russian cyberattacks targeting U.S. critical infrastructure. Mick and Ryan also competed in a 60 second charity challenge to explain why Americans should be concerned about the potential for a Russian cyberattack targeting U.S. critical infrastructure.

[Thoughtleadership webinar] The emerging cyber threat and attack trends of 2022 with Bryan Seely

Tune in to this webinar featuring ManageEngine product expert, Ganesh, and cybersecurity expert and ethical hacker, Bryan Seely, to understand the emerging cyber threat trends in 2022, and how organizations can stay on top of attacks with a solid PAM programme.

Network Evidence For XDR

XDR - Extended detection and response - promises to integrate data from any source to stop today's sophisticated and often automated attacks. The key is: Which source? Register for this exclusive session for insights on why network evidence must be a key part of your XDR strategy. Topics to be discussed include how to: Walk away with new ideas on how to stay ahead of ever-changing attacks by using a data-first strategy for detection and response.

Streamline KYC Onboarding Workflow with Kroll's Business Connect Platform

Introducing Kroll Business Connect for compliance professionals, a centralized, cloud-based platform designed to streamline know your customer (KYC) onboarding workflow – including file sharing, communications and tasks – in real-time with all stakeholders using one single platform. Compliance teams in any industry can tailor our proprietary platform to their specific needs. Business Connect easily integrates with any compliance software or CRM system.