Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

Implementing Organizational Segmentation - RBAC - Tanium Tech Talks #106

Today we are getting into the weeds of implementing Tanium RBAC at scale - Role Based Access Control. What does it look like in real life? If you're a global company, a state government, any organization that has business units or agencies that needs separated duties and permissions within a single Tanium console, then this show is for you. The two-part RBAC episode #81 linked below is the pre-requisite for this video.

Tines for governance, risk, and compliance: Mastering GRC with workflow automation and orchestration

Unlock the secrets to staying ahead in the ever-evolving world of governance, risk, and compliance (GRC) in our upcoming webinar. In this webinar, we will share an overview of the current GRC landscape and the transformative potential of workflow automation and orchestration. During the webinar, we discussed: Whether you're a seasoned GRC professional or just beginning to explore workflow automation and orchestration, this webinar offers essential insights and actionable strategies to help you navigate the complexities of GRC in today's dynamic environment.

Responsible AI: Policy Solutions for DevSecOps

Artificial intelligence (AI) is revolutionizing problem-solving and innovation in DevSecOps. Leveraging AI responsibly is essential for building secure, trustworthy systems. Governments are crafting policies to ensure AI's benefits while mitigating risks. Join JFrog's VP of Product Marketing, Jens Eckels, and BSA CEO, Victoria A. Espinel, as they explore how BSA’s Policy Solutions for Building Responsible AI provides a framework to achieve these goals, focusing on governance, innovation, and transparency.

Webinar Replay - AI Security Testing: Prompt Injection Everywhere

Kroll’s LLM penetration testing has seen it analyze data sets of OpenAI models, non-public models and RAG systems. It has used this to produce an anonymized dataset that catalogs vulnerabilities from all LLM engagements. Kroll has found a worrying prevalence of prompt injection attacks in the LLM cases it has investigated and shares its findings in this briefing.

Ransomware as a Business with Ken Westin from LimaCharlie

Ken Westin, Senior Solutions Engineer at LimaCharlie, joined us for Defender Fridays to discuss Ransomware as a Business. Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry.

Threat Hunting for macOS, Part Two

In part 1 of our Threat Hunting for macOS webinar series we explored basic use cases for utilizing macOS Unified Logging (MUL) and system telemetry to uncover suspicious behavior. Building upon this foundation, in part two we explore more intricate use cases and tap into third-party logs to uncover sophisticated attack TTPs.