Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Demo

FROGBOT : Securing your git repository! What is new!

GitHub Security Alerts! Support for Yarn 2... Frogbot scans every pull request created for security vulnerabilities with JFrog Xray and in version 2.3.2 it even opens pull requests for upgrading vulnerable dependencies to a version with a fix! With Frogbot installed, you can make sure that new pull requests don’t add new security vulnerabilities to your code base alongside them. If they do, the creator of the pull request has the opportunity to change the code before it is merged.

Authenticated | Arctic Wolf

In the first episode of Authenticated, Arctic Wolf Chief People Officer Dan Schiappa and Arctic Wolf Research and Development VP Daniel Thanos, detail the unique opportunity that Arctic Wolf Labs has to help reduce alert fatigue for security practitioners, serve the public good, and lead the industry in innovation by combining leading-edge AI with human intelligence.

Should You Worry About Ransomware Attacks?

Over $800,000 - that’s the cost of the average ransomware payout last year. 66% of mid-sized organizations and about 37% of global organizations got hit. (Sources cited below) Attackers have developed new techniques that a lot of companies aren’t aware of or prepared for. For example, the demand for ransomware as a service has hugely increased, resulting in many more organizations being hacked every day.

UpGuard Reporting Improvements Demo // Chris Schubert, Senior Product Manager

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Reporting Improvements Our new reports library which centralizes a variety of frequently used reports for you to explore and generate. Some updates we’ve made to both BreachSight and Vendor Risk reports; making it easier for you to generate either executive level summary reports or detailed reporting.

UpGuard Vendor Risk Matrix Demo // Annie Luu, Product Marketing Manager

Hear from UpGuard's Product Marketing Manager, Annie Luu, as she introduces you to UpGuard's new Vendor Risk Matrix. The new vendor risk matrix, that measures vendor security ratings by business impact, has been added to the Vendor Risk Executive Summary. This feature will help drive action where it matters most, highlighting your vendors of most concern in the top right of the matrix.It’s now easier to quickly focus on the most impactful areas of your third party risk management program, by visualizing your vendor portfolio risk by Security Rating and Tier.

Introduction to Splunk Common Information Model

Security and IT analysts need to be able to find threats and issues without having to write complex search queries. The Splunk Common Information Model (CIM) delivers a common lexicon of field names and event types across different vendor data sources making them consistent so that analysts can write clearer queries and get better results with more true positives and fewer false positives.