Pondurance
Pondurance
  • 69
  • 42 309
The ABC's of BEC
In this webinar, Pondurance and Lewis Brisbois experts will breakdown the latest in Business Email Compromise (BEC) including common attack vectors our experts are seeing, the impact to your business, and how to avoid potential risk to your organization.
Speakers:
Kamran Salour - Partner, Lewis Brisbois
Ryan M. Cook - Associate, Lewis Brisbois
Dustin Hutchison - Vice President of Services & CISO, Pondurance
Max Henderson - Assistant Vice President of Digital Forensics and Incident Response
Переглядів: 70

Відео

Conversations: From CISO to Leadership to the Board
Переглядів 3014 днів тому
An organization’s cybersecurity posture and risk tolerance are at the forefront of every CISOs mind. But it can be a challenge for CISOs or cybersecurity leads to communicate how an organization’s cybersecurity investment impacts the overall reduction of risks, and aligns with their business objectives. As a leader in cybersecurity advisory services, Pondurance helps CISOs and cyber security te...
The Value of a Network Sensor
Переглядів 4521 день тому
Join Erik Mogus, Director of Product Management at Pondurance, in this engaging webinar as he dives into the importance of network sensor metadata in cybersecurity. Discover how network sensors provide critical alerts and valuable context for security operations center (SOC) analysts. Erik covers the three key functions of network sensors and explains how the integration of metadata improves in...
Demonstrating the Value of Your Cybersecurity Program
Переглядів 69Місяць тому
Explore how cybersecurity leaders are successfully demonstrating the value of their cybersecurity programs through a risk-based approach. Gain insights into real-world examples and strategies that have secured resources, support, and budgets by effectively communicating risks to various audiences. Join this webinar to learn more about: - Aligning cybersecurity with business objectives and outco...
From Reactive to Proactive: Addressing and Preparing for Cybersecurity Incidents
Переглядів 952 місяці тому
63% of ransomware attackers gain unauthorized access to networks six months or more before they are detected, a troubling statistic that underlines the lack of proper security prevention. For organizations to mitigate the far-reaching impact of ransomware attacks, the key buzzword is “proactive.” Discover how to better address and prepare for cybersecurity incidents in the healthcare industry i...
Optimizing MDR in Risk-Based Cybersecurity
Переглядів 1,2 тис.6 місяців тому
What does "risk-based cybersecurity" mean in today's context? What's the link to Managed Detection and Response (MDR), and what should organizations look for in their MDR provider? Doug Howard, CEO of Pondurance, weighs in with his use cases, compliance and strategies for getting the most from MDR. In this video interview with Information Security Media Group, Howard discussed: - What risk-base...
Accelerate Your Security Posture with Risk-Driven Security Strategies
Переглядів 3356 місяців тому
Each industry comes with its own set of cybersecurity challenges with respect to compliance regulations, and data protection. IT and security leaders can accelerate security program objectives by utilizing a risk-based approach to cybersecurity.. A risk-based approach helps to prioritize the most relevant risks to an organization, and aligns the cybersecurity program with their unique business ...
Double Click on Risk-Based Cybersecurity at the RSA Conference
Переглядів 1916 місяців тому
All organizations have a unique set of business objectives and desired outcomes. Each organization also has its own set of cyber risks, including gaps and blind spots within its network that can expose the business to a cyberattack. Pondurance addresses these unique risks by adopting a risk-based approach to cybersecurity that aligns with an organization’s outcomes, objectives, and risks. At th...
Key Benefits of a Risk-Based Approach to Managed Detection and Response (MDR)
Переглядів 5507 місяців тому
Pondurance's Johnny Calhoun meets with Aberdeen's Derek Brink to discuss the benefits of prioritizing risk in your approach to managed detection and response services.
E&I Cooperative Services
Переглядів 418 місяців тому
Pondurance, a national cybersecurity firm that provides an array of comprehensive services to clients, was recently selected to partner with E&I Cooperative Services, a procurement cooperative serving the education industry.
Risk-Based Security: What to Look for in an MDR Provider
Переглядів 471Рік тому
With so many cybersecurity technologies and services available, how do organizations get started with evaluating the managed detection and response option that is right for them? Lyndon Brown of Pondurance weighs in on how to select the MDR provider that fits your needs best. In a video interview with Information Security Media Group, Brown discusses: - How to shift to risk-based security - The...
True MDR Service Providers Will Prevail
Переглядів 38Рік тому
There will be a reckoning in the managed detection and response (MDR) market, separating true MDR service providers from those drafting off marketing hype and offering only elements of threat detection and response. Want to learn more? We share the top emerging trends that we predict will shape the cybersecurity industry in 2023 in this eBook. www.pondurance.com/resource/ebooks/cybersecurity-pr...
Zero-trust Security Gains Momentum, But Execution Will Lag
Переглядів 13Рік тому
The zero-trust security model will continue to gain momentum, but actual implementation and execution-especially in healthcare-will lag. Want to learn more? We share the top emerging trends that we predict will shape the cybersecurity industry in 2023 in this eBook. www.pondurance.com/resource/ebooks/cybersecurity-predictions-2023/
Cybercriminal Competition Decreases Dwell Time
Переглядів 9Рік тому
Competition among bad actor groups will result in a continued reduction in dwell time. Want to learn more? We share the top emerging trends that we predict will shape the cybersecurity industry in 2023 in this eBook. www.pondurance.com/resource/ebooks/cybersecurity-predictions-2023/
Exponentially More Mobile Device Attacks
Переглядів 14Рік тому
Mobile device attacks will increase exponentially. Want to learn more? We share the top emerging trends that we predict will shape the cybersecurity industry in 2023 in this eBook. www.pondurance.com/resource/ebooks/cybersecurity-predictions-2023/
Zero Day Vulnerabilities and Zero Day Exploits
Переглядів 34Рік тому
Zero Day Vulnerabilities and Zero Day Exploits
More Cybersecurity Vendor Solutions Fall Victim to Breaches
Переглядів 9Рік тому
More Cybersecurity Vendor Solutions Fall Victim to Breaches
Accelerated Federal Guideline Introductions
Переглядів 4Рік тому
Accelerated Federal Guideline Introductions
Stricter Cyber Insurance Requirements
Переглядів 8Рік тому
Stricter Cyber Insurance Requirements
The Rise of Hacktivism
Переглядів 38Рік тому
The Rise of Hacktivism
Budget Cuts and Cybersecurity
Переглядів 9Рік тому
Budget Cuts and Cybersecurity
Increasing Instances of Critical Infrastructure (CI) Ransomware
Переглядів 20Рік тому
Increasing Instances of Critical Infrastructure (CI) Ransomware
Modern MDR: Why It's Mission-Critical
Переглядів 1512 роки тому
Modern MDR: Why It's Mission-Critical
The Roadway to Modern Managed Detection & Response
Переглядів 1542 роки тому
The Roadway to Modern Managed Detection & Response
How do I prevent getting hacked? Tales, tips, and tricks for securing your personal data
Переглядів 1242 роки тому
How do I prevent getting hacked? Tales, tips, and tricks for securing your personal data
Understanding and Preventing Fraudulent Wire Transfers
Переглядів 822 роки тому
Understanding and Preventing Fraudulent Wire Transfers
Defining Modern MDR at RSA Conference
Переглядів 3262 роки тому
Defining Modern MDR at RSA Conference
S4x22 Keynote: Cyber Conflict and International Relations with Niloofar Razi-Howe
Переглядів 2742 роки тому
S4x22 Keynote: Cyber Conflict and International Relations with Niloofar Razi-Howe
Complexities of Cyber Attribution panel, Vanderbilt Summit May 4-5, 2022
Переглядів 1642 роки тому
Complexities of Cyber Attribution panel, Vanderbilt Summit May 4-5, 2022
How long does MDR take to implement?
Переглядів 262 роки тому
How long does MDR take to implement?

КОМЕНТАРІ