We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Windows Client Privilege Escalation
Penetration testers and Red Teamers won't want to miss this webinar on Windows client privilege escalation where we discuss enumeration, tools, and techniques.

Ask Me Anything: The Road to Purple Teaming - Evolution and Lessons Learned
Join Attack Simulation & Detection Practice Lead Megan Nilsen and Security Consultants Travis Steadman and Zach Bevilacqua to learn more about Purple Teaming…

2024 Conference Roundup
Join David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for firsthand accounts on the largest industry conferences in 2024, sharing key takeaways for 2025.

DOD Contract Compliance: DFARS 7012 and CMMC
Learn how to navigate DOD contract clauses and CMMC requirements for protecting FCI and CUI, and effectively implement compliance changes for your organization.

The Lost Underground
Join Mike Felch on an eye-opening journey into the lost underground of cybersecurity, exploring its historical foundation, ideological divide, and lasting…

BEC Basics: Your First Step to Thwarting Email Scams
Learn to identify and combat business email compromise (BEC) threats in Microsoft 365 with expert Steven Erwin and Caroline Fenstermacher.

Navigating Compliance: FCI and CUI Requirements for Federal Contractors
TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Ask Me Anything: Mobile Security
Expert panel shares latest mobile testing techniques, vulnerabilities, and strategies to secure mobile apps from sophisticated threats, protecting your mobile…

Ask Me Anything: Advanced Cloud Pen Testing Scenarios
Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and…

Calculating Business Impact
Join TrustedSec's Rockie Brockway to learn how to measure Business Impact, quantify financial, operational, and reputational losses, and establish a…

Understanding and Documenting PCI DSS Scope
As new PCI DSS guidance emerges, the expectations placed on auditors and the entities they assess are evolving. New requirement 12.5.2 defines scope…

Ask Me Anything: Proactive Threat Hunting
As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
