Webinar: Container Security & Compliance

April 30, 2019 | By:

Please note that this webinar was recorded on May 15, 2019. A growing trend. Using containers has been an increasing trend over the years as most companies are leveraging services to streamline their development needs. As this trend grows, many security professionals struggle to effectively layer the organization’s compliance obligations into these environments. …with growing…

Webinar: Simulating a Cyber Attack – Table-Top Best Practices

March 14, 2019 | By:

Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them to see if they work. Penetration tests will only go so far and only deal with the technical aspects of preventing a breach….

Webinar: Using MITRE ATT&CK(TM) for Coverage and Effectiveness Assessments

January 30, 2019 | By:

Recorded on February 13th, 2019, AT 1:00 PM EST What is the MITRE ATT&CK(TM) Framework? The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKTM) Framework (https://attack.mitre.org/) is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It is fast becoming…

Webinar Series: Fundamentals of Post-Exploitation with Carlos Perez

December 20, 2018 | By:

Learn the basics of post-exploitation from advanced infosec professionals Join Carlos Perez (@darkoperator) as he shares some of the post-exploitation methodology used by TrustedSec security consultants performed during actual attack simulations. Each of the four individual webinars will focus on specific aspects that will build upon each other to give a complete picture of the…

Webinar: Cloud Security: Pen Testing and Program Building

November 29, 2018 | By:

This webinar was held on December 12th at 1:00 EST Companies Are Still Foggy With Security in the Cloud. One of the questions we get most often is about cloud security. In fact, it’s one of the least understood areas for both penetration testing and security program building as cloud services such as Azure and AWS…

Webinar: Creating your Career Path in Information Security

October 25, 2018 | By:

View a recording of our webinar that took place on Wednesday, November 14th, 2018 at 3:30 PM TrustedSec Senior Security Consultant Adam Compton will lead a discussion about different paths to a potential career in infosec. Geared towards students, IT professionals or those interested in a career change, Adam will present his experience in understanding…

Webinar: vCISO vs CISO – Which is the right path for you?

September 28, 2018 | By:

Please note: this webinar was completed on on Wednesday, October 17th, 2018 AT 1:00 PM EDT Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. There is continuing pressure to keep our information secure and breach-free, and to create leadership roles…

Webinar – Navigating the Risks & Rewards of Evolution in the Automotive Industry

July 30, 2018 | By:

– JOIN TRUSTEDSEC and MARSH ON September 12th, 2018 AT 2:00 PM EDT – The automotive industry is experiencing a level of change and innovation not seen since the introduction of the passenger car. While this sector has traditionally been dominated by original equipment manufacturers (OEMs) and their suppliers, today it welcomes a host of…

Webinar: IoT Security – Getting ahead of the digital impact to your business

July 09, 2018 | By:

– Recorded on July 25th, 2018 AT 1:00 PM EST – The End of the Beginning After 3+ years of hype, where are we now with Internet of Things security, and where are we going? There is continuing pressure to keep our business “things” secure and breach-free.  With crashes and attacks now being reported regularly…

Webinar: The Evolution of Pen Testing

May 31, 2018 | By:

Simulating Real-World Adversaries with Cutting-Edge Research – Recorded on June 20th, 2018 AT 1:00 PM EST – Real world attacks don’t always align with previous pen testing techniques – Tools have caught up! The most challenging aspect of security today is understanding the real-world effectiveness of your existing security controls.  With the latest advances in Next Generation (Next Gen),…