Webinar: Simulating a Cyber Attack – Table-Top Best Practices

March 14, 2019 | By:

JOIN TRUSTEDSEC ON March 27th, 2019 AT 1:00 PM EST Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them to see if they work. Penetration tests will only go so far and…


Webinar: Using MITRE ATT&CK(TM) for Coverage and Effectiveness Assessments

January 30, 2019 | By:

JOIN TRUSTEDSEC ON February 13th, 2019, AT 1:00 PM EST What is the MITRE ATT&CK(TM) Framework? The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKTM) Framework (https://attack.mitre.org/) is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It is fast…


Webinar Series: Fundamentals of Post-Exploitation with Carlos Perez

December 20, 2018 | By:

Learn the basics of post-exploitation from advanced infosec professionals Join Carlos Perez (@darkoperator) as he shares some of the post-exploitation methodology used by TrustedSec security consultants performed during actual attack simulations. Each of the four individual webinars will focus on specific aspects that will build upon each other to give a complete picture of the…


Webinar: Cloud Security: Pen Testing and Program Building

November 29, 2018 | By:

This webinar was held on December 12th at 1:00 EST   Companies Are Still Foggy With Security in the Cloud. One of the questions we get most often is about cloud security. In fact, it’s one of the least understood areas for both penetration testing and security program building as cloud services such as Azure and…


Webinar: Creating your Career Path in Information Security

October 25, 2018 | By:

View a recording of our webinar that took place on Wednesday, November 14th, 2018 at 3:30 PM TrustedSec Senior Security Consultant Adam Compton will lead a discussion about different paths to a potential career in infosec. Geared towards students, IT professionals or those interested in a career change, Adam will present his experience in understanding…


Webinar: vCISO vs CISO – Which is the right path for you?

September 28, 2018 | By:

Please note: this webinar was completed on on Wednesday, October 17th, 2018 AT 1:00 PM EDT Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. There is continuing pressure to keep our information secure and breach-free, and to create leadership roles…


Webinar – Navigating the Risks & Rewards of Evolution in the Automotive Industry

July 30, 2018 | By:

– JOIN TRUSTEDSEC and MARSH ON September 12th, 2018 AT 2:00 PM EDT – The automotive industry is experiencing a level of change and innovation not seen since the introduction of the passenger car. While this sector has traditionally been dominated by original equipment manufacturers (OEMs) and their suppliers, today it welcomes a host of…


Recording: IoT Security – Getting ahead of the digital impact to your business

July 09, 2018 | By:

– JOIN TRUSTEDSEC ON July 25th, 2018 AT 1:00 PM EST – The End of the Beginning After 3+ years of hype, where are we now with Internet of Things security, and where are we going? There is continuing pressure to keep our business “things” secure and breach-free.  With crashes and attacks now being reported…


Recording: The Evolution of Pen Testing

May 31, 2018 | By:

Simulating Real-World Adversaries with Cutting-Edge Research – JOIN TRUSTEDSEC ON June 20th, 2018 AT 1:00 PM EST – Real world attacks don’t always align with previous pen testing techniques – Tools have caught up! The most challenging aspect of security today is understanding the real-world effectiveness of your existing security controls.  With the latest advances in Next Generation (Next…


Recording: Ensuring Risk Assessments Have Business Value

April 24, 2018 | By:

JOIN TRUSTEDSEC ON MAY 23rd, 2018 AT 1:00 PM EST There is continuing pressure to keep our information secure and breach-free. At the same time, management often doesn’t see the need of increasing budget if there isn’t an incident occurring or a compliance need. So how does someone in the trenches measure, monitor, and communicate…