Recorded Webinars

This webinar was recorded on Wednesday, October 16th Blockchain technology has been out for a while and has advertised many benefits over various transactions, including transparency, security, and speed. With these promises, several organizations have exploratory projects looking to take advantage...
Recorded on Wednesday, September 25th Ain’t nobody got time for that! Are you feeling overwhelmed? Have you been diagnosed with a case of audit fatigue? The growth in third-party assessment requests has exploded–more and more organizations are being forced to...
Recorded August 21, 2019 at 1 P.M. EST Adversaries continue to morph tactics and identify new ways of attacking organizations. Whether emulating a perimeter breach or the more popular phishing attack on the user population, it has never been more...
Recorded July 24, 2019 at 1:00 P.M. EST The idea of segmenting your network is not new. However, even in 2019, we still see companies with flat networks ripe for attack. This provides a much greater opportunity for malicious actions...
Recorded June 19, 2019 at 1 P.M. EST Situational awareness is key when one lands access on a target system as part of an attack simulation. Knowing what controls are present and which are likely present allows performance of a...
Recorded May 30, 2019 at 1 P.M. EST The majority of organizations that are in the process of building a security program are starting with a security framework. Frameworks seek to provide a reference for planning but also ensure that...
Recorded May 15, 2019 at 1 P.M. EST A growing trend. Using containers has been an increasing trend over the years as most companies are leveraging services to streamline their development needs. As this trend grows, many security professionals struggle...
Recorded March 27, 2019 at 1 P.M. EST Practice? We’re talking about practice?! Cyber attacks are an organizational concern. In order to build an effective security program, it’s impossible to rely on “best practice” policies without testing and vetting them...
Recorded on February 13th, 2019, AT 1:00 PM EST What is the MITRE ATT&CK(TM) Framework? The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKTM) Framework (https://attack.mitre.org/) is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available...
Learn the basics of post-exploitation from advanced infosec professionals Join Carlos Perez (@darkoperator) as he shares some of the post-exploitation methodology used by TrustedSec security consultants performed during actual attack simulations. Each of the four individual webinars will focus on...
Recorded December 12, 2018 at 1:00 P.M. EST Companies Are Still Foggy With Security in the Cloud. One of the questions we get most often is about cloud security. In fact, it’s one of the least understood areas for both...
Recorded November 14, 2018 at 3:30 P.M. EST TrustedSec Senior Security Consultant Adam Compton will lead a discussion about different paths to a potential career in infosec. Geared towards students, IT professionals or those interested in a career change, Adam...
Recorded October 17th, 2018 at 1:00 PM EDT Organizations are facing a dangerous combination of mounting cybersecurity threats and a widening gap in the skills required to identify and combat them. There is continuing pressure to keep our information secure...
Recorded July 25th, 2018 at 1:00 PM EST The End of the Beginning After 3+ years of hype, where are we now with the Internet of Things security, and where are we going? There is continuing pressure to keep our...
Recorded June 20th, 2018 AT 1:00 PM EST Real-world attacks don’t always align with previous pen testing techniques – Tools have caught up! The most challenging aspect of security today is understanding the real-world effectiveness of your existing security controls.  With the latest...
Recorded May 23, 2018 at 1:00 PM EST There is continuing pressure to keep our information secure and breach-free. At the same time, management often doesn’t see the need of increasing budget if there isn’t an incident occurring or a...
Recorded April 18, 2018 at 1:00 PM EST The General Data Protection Regulation (GDPR) (Regulation [EU] 2016/679) has many organizations “gnashing their teeth” trying to become compliant. And if you think this Facebook’s privacy debacle doesn’t have anything to do...
It is finally here. The forward dated controls that have been in existence since the release of version 3.2 of the PCI Data Security Standard are required as of February 1st. Companies are still struggling Hopefully, by now you have had a chance to...
  • Browser by Category

  • Clear Form