Webinar Series: Fundamentals of Post-Exploitation with Carlos Perez

December 20, 2018 | By:

Join us for this webinar series starting on Wednesday January 16th at 1:00 EST Learn the basics of post-exploitation from advanced infosec professionals Join Carlos Perez (@darkoperator) as he shares some of the post-exploitation methodology used by TrustedSec security consultants performed during actual attack simulations. Each of the four individual webinars will focus on specific aspects…


Webinar: Cloud Security: Pen Testing and Program Building

November 29, 2018 | By:

This webinar was held on December 12th at 1:00 EST   Companies Are Still Foggy With Security in the Cloud. One of the questions we get most often is about cloud security. In fact, it’s one of the least understood areas for both penetration testing and security program building as cloud services such as Azure and…


Webinar: Creating your Career Path in Information Security

October 25, 2018 | By:

View a recording of our webinar that took place on Wednesday, November 14th, 2018 at 3:30 PM TrustedSec Senior Security Consultant Adam Compton will lead a discussion about different paths to a potential career in infosec. Geared towards students, IT professionals or those interested in a career change, Adam will present his experience in understanding…


Webinar: vCISO vs CISO – Which is the right path for you?

September 28, 2018 | By:

Please note: this webinar was completed on on Wednesday, October 17th, 2018 AT 1:00 PM EDT Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. There is continuing pressure to keep our information secure and breach-free, and to create leadership roles…


Webinar – Navigating the Risks & Rewards of Evolution in the Automotive Industry

July 30, 2018 | By:

– JOIN TRUSTEDSEC and MARSH ON September 12th, 2018 AT 2:00 PM EDT – The automotive industry is experiencing a level of change and innovation not seen since the introduction of the passenger car. While this sector has traditionally been dominated by original equipment manufacturers (OEMs) and their suppliers, today it welcomes a host of…


Recording: IoT Security – Getting ahead of the digital impact to your business

July 09, 2018 | By:

– JOIN TRUSTEDSEC ON July 25th, 2018 AT 1:00 PM EST – The End of the Beginning After 3+ years of hype, where are we now with Internet of Things security, and where are we going? There is continuing pressure to keep our business “things” secure and breach-free.  With crashes and attacks now being reported…


Recording: The Evolution of Pen Testing

May 31, 2018 | By:

Simulating Real-World Adversaries with Cutting-Edge Research – JOIN TRUSTEDSEC ON June 20th, 2018 AT 1:00 PM EST – Real world attacks don’t always align with previous pen testing techniques – Tools have caught up! The most challenging aspect of security today is understanding the real-world effectiveness of your existing security controls.  With the latest advances in Next Generation (Next…


Recording: Ensuring Risk Assessments Have Business Value

April 24, 2018 | By:

JOIN TRUSTEDSEC ON MAY 23rd, 2018 AT 1:00 PM EST There is continuing pressure to keep our information secure and breach-free. At the same time, management often doesn’t see the need of increasing budget if there isn’t an incident occurring or a compliance need. So how does someone in the trenches measure, monitor, and communicate…


Recording: Facebook’s Data Scandal and GDPR – How IT Impacts You

April 03, 2018 | By:

JOIN TRUSTEDSEC ON APRIL 18, 2018 AT 1:00 PM EST The General Data Protection Regulation (GDPR) (Regulation [EU] 2016/679) has many organizations “gnashing their teeth” trying to become compliant. And if you think this Facebook’s privacy debacle doesn’t have anything to do you, think again: Unlike PCI, whose standards affect their own customers and thus…


Recording: New PCI Requirements are Now, Actually, Required!

February 28, 2018 | By:

It is finally here. The forward dated controls that have been in existence since the release of version 3.2 of the PCI Data Security Standard are required as of February 1st. Companies are still struggling Hopefully by now you have had a chance to review them, but there are still a number of companies struggling to interpret scope or…