Host Angela Rizzo sits down with other cybersecurity experts to discuss the latest trends, developments, and challenges that are shaping the cyber landscape. Tune into CyberCast to hear the stories and conversations that are changing the way we think about the industry.
In today’s healthcare world, it’s not just about finding the needle in the haystack. It’s knowing how to safely dispose of the needle once you have found it. As healthcare organizations rely on a fully digitized and interconnected treatment ecosystem, facilities struggle to protect patient security and privacy and to prevent facility-wide cybersecurity disruptions. Join cybersecurity author Mark Sangster and healthcare cybersecurity expert Richard Staynings as they explore how hospitals can protect their patients and ensure continuous operations. Learn more about healthcare cybersecurity with this Solution Brief.
Ransomware and business email compromise is a billion-dollar a year cybercrime industry that can put any organization at risk. Fake invoices, compromised credentials and exfiltrated data can cost your organization millions. In today’s climate, a strong cybersecurity strategy has to include a strong cybersecurity insurance policy. Join eSentire’s Vice President and Industry Security Strategist Mark Sangster and Catherine Lyle, Head of Claims at Coalition, Inc., as they discuss shifts in the cybersecurity insurance industry, coverage trends and what happens when you make a claim.
In May 2020, in the midst of a class-action suit against Capital One, the banking conglomerate was ordered to produce the cybersecurity incident response report at the heart of a 2018 cybersecurity breach that exposed over 100 million confidential financial records. This ruling created a tectonic shift in the way companies position their legal representatives to protect potentially damning information from discovery during the legal process. Listen in as eSentire’s Mark Sangster and legal expert Justin Daniels, of Peachtree Living Labs, examine determining factors in the ruling and how companies should approach cybersecurity and legal best practices going forward.
Benefit from Industry 4.0 initiatives without falling victim to debilitating cyberattacks with these insights for manufacturers that include: How digital transformation and new intelligent solutions have caused the threat surface to increase substantially How to avoid common mistakes, enable effective cybersecurity governance, understand operational security considerations, manage supply chain risk and outsource risk management
As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.
As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.
As the volume of cybersecurity threats continue, adversaries are also using increasingly sophisticated techniques to target businesses. The MITRE ATT&CK framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization's risk. This podcast will explore what it is and its effectiveness in modern IT environments.
Listen and learn about the best practices for securing a cloud environment (AWS/Azure) and methods that can be employed to conduct threat hunting exercises against collected data, as discussed by Kurtis Armour and Jacob Gant, senior security strategists at eSentire. They also delve into how investigative details and context can be gained by the correlation of endpoint and cloud events.
eSentire's U.K. Threat Intelligence Spotlight highlighted a 140% yearly increase in cybersecurity incidents experienced by U.K. businesses. Cybersecurity threats continue to increase as adversaries develop sophisticated targeting techniques. Many of these threats are preventable by traditional security technologies and platforms to flag unusual behaviour. However, the most advanced threats are often those that lurk undersurface – and that’s where a skilled security operation comes in.
Cybersecurity risk is unavoidable, but a sensitive data breach does not have to be. In this podcast we dissect the mindset and motivations of hackers, discuss the likelihood of a breach event, and explore ways business can protect their sensitive data from unauthorized exposure.
Artificial Intelligence and Machine Learning are popular topics among cybersecurity leaders. In theory, the technology can be a companion to human intelligence. But in practice, the details surrounding its success stories and challenges are cloudy. In this episode, we’ll explore a highly successful use case that demonstrates how Machine Learning can solve real problems in cybersecurity, and how common pitfalls can be avoided.
In 2018, EU GDPR regulations changed the face of data privacy and dominated the cybersecurity conversation in Europe. But cybersecurity professionals working with UK organizations can’t afford to confuse the GDPR’s privacy regulations with security regulation. In this podcast, we’ll explore trends how businesses balance the need for data protection regulations and evolving cybersecurity technology.
In the aftermath of a breach, you’ll need to demonstrate to your board and other key stakeholders that you put reasonable care into identifying and mitigating risks to your organization. That means going above and beyond compliance. In this episode, we’ll discuss the steps you can take right now to ensure you’re prepared to demonstrate reasonable care after a breach.
Many Managed Security Service Providers (MSSP) are attempting to deliver Managed Detection and Response (MDR) services. Few are equipped to do so. In this episode, we’ll discuss the distinctions between an MSSP and a pure play MDR provider, and how organizations can benefit from a true MDR approach.
Endpoints are popular targets for sophisticated threat actors, many of whom know they can bypass traditional antivirus solutions. So how can organizations with limited resources modernize their endpoint defense? In this episode, we’ll explore how organizations can secure their endpoints with next generation antivirus and human expertise.
Join host Angela Rizzo as she speaks with eSentire Director of Product Marketing, Wes Hutcherson, about a next generation solution for threat visibility and hunting. Traditional SIEM platforms are no longer providing security teams with the visibility they need to keep up with modern threats. Wes describes how eSentire’s esLOG+ is revolutionizing logging platforms by enabling full spectrum threat detection and response.
Join host Angela Rizzo as she speaks with eSentire’s Vice President of Strategy, Alex Jinivizian, about the challenges facing modern security teams. Increasing IT complexity is leaving a wider netof targets for threat actors, creating more challenges for security officers and their teams. Alex describes how an end-to-end MDR solution can provide a more predictive approach to securingyour IT infrastructure against cyberattacks.
Join host Angela Rizzo as she speaks with eSentire President & COO J. Paul Hayes about an asset management firm in trouble. The average cost of a breach within the financial industry is $18.3 million dollars. So when one financial firm discovered a breach, they had to act fast. J. Paul describes how that firm was able to respond quickly and save millions in losses. It’s the rare financial cyberattack story that has a happy ending.
Join host Angela Rizzo as she speaks with eSentire founder Eldon Sprickeroff about a healthcare facility facing a cyberattack. Healthcare facilities are a prime target for bad actors due to the sensitive information they store. Eldon describes how one healthcare facility confronted a potentially devastating cyberattack, and found a solution that pulled them back from the brink of disaster.
Join host Angela Rizzo as she speaks with eSentire Vice President of Strategic Marketing Mark Sangster about an evolving Managed Detection and Response solution. The threat landscape is continuously expanding, forcing information security teams to adapt their solutions to new threats. Mark describes how eSentire has developed an evolving MDR solution that leverages artificial intelligence and human expertise to stay one step ahead of threat actors.