Our lead penetration tester will take you through his most memorable pen testing experiences. During the discussion you’ll gain insights into the challenges faced, the victories celebrated, and the lessons learned during real-life penetration testing engagements. These stories from the front lines will give you an unparalleled understanding of the intricacies of maintaining robust network defenses in the face of ever-evolving threats.
Our panel of experts will illuminate the complex landscape of social media forensics and equip you with the knowledge and tools necessary to navigate it effectively. Through real-world examples and practical insights, this webinar will provide a comprehensive understanding of social media forensics, empowering you to better represent your clients and maximize the impact of digital evidence in your cases.
Our lead penetration tester takes you inside the mind of a hacker to show you how external-facing hosts can provide entry points for unauthorized access to your internal network in this on-demand webinar. This simulation of an external penetration test shows how to identify and exploit a vulnerability on a company’s external-facing firewall. You’ll see firsthand the different methods used by hackers to gain unauthorized access to your network and learn how to better protect against these threats.
In-house litigation counsel are increasingly being challenged to move beyond a necessary cost center to delivering value to the legal department and the organization. In this on-demand webinar, moderated by Damian Durrant, experienced in-house counsel will provide practical pointers to define value beyond just reducing outside counsel spend, as well as smart ways to manage litigation to deliver it in ways the organization can understand.
Just as security experts work collaboratively to develop new defenses against cyber threats, hackers are corresponding with one another to find new ways gain access to your sensitive data. This includes sharing information on the dark web on how to bypass common compliance regulations and cybersecurity frameworks. Learn how hackers build out target profiles leading up to an attack, as well as how to defend your network through penetration testing during this informational webinar.
Everybody knows that a data breach is an inevitable part of business in today’s technological age. But how a company reacts to and manages this stressful situation will ultimately determine how well it will weather the storm. Compare responses from Company A and Company B leading up to, during, and months after the initial compromise during this discussion. Do you know how well would your company fair during a data breach?
Many businesses have been relying on cyber insurance to transfer risk. Consequently, the cyber insurance marketplace is responding with new requirements for businesses to document their cybersecurity defenses, practices and controls. Without establishing certain controls, businesses face increased premiums, higher deductibles, lower coverage limits, and a potential non-renewal. Learn how to lower your cyber insurance premiums and overall risk during this informational webinar.
The use of digital forensics and eDiscovery in litigation is rapidly expanding as electronically stored information (ESI) continues to be created. In the Rittenhouse trial, digital forensics was brought into the spotlight for the legal community, exposing the common misconceptions and pitfalls associated with digital data. Learn what went wrong and how to avoid these missteps during this informational webinar.
There’s no denying the significance that mobile devices play in our lives and the amount of information they hold. This is also true of social media, with the rise of its usage. As a result, mobile devices and social media are quickly becoming an integral part of the eDiscovery process. Learn how digital forensics is adapting to these constantly changing data sources during this informational webinar.
As more federal contracts begin incorporating the Cybersecurity Maturity Model Certification (CMMC) directly into their contracts, organizations that are proactively taking steps to meet those requirements will have an advantage against their competitors. Learn how to take those steps by managing your third-party risk and securing your digital supply chain during this informational webinar.