Types (1)
Select Topic
Monthly Live Demo: Red Canary Security Operations Platform
Clear Filters
Filter by Type
Filter by Topic
RSA Conference
Western Canada Information Security Conference
CyberNow Summit
Data Connectors
Cyber Security Summit
Live Launch: 2021 Threat Detection Report
Chain Reactor: Adversary Simulation on Linux
The Detection Series: Windows Management Instrumentation
How to detect a Ryuk ransomware outbreak for healthcare organizations
The Rise of Island Hopping and Counter Incident Response
Securing Distributed Healthcare Organizations
ATT&CK® Deep Dive: Rootkits
Seek & Deploy: Microsoft Defender ATP
Security Allies: Why Successful EDR Deployments Require a Team
ATT&CK® Deep Dive: Process Injection
Upended Overnight: Facing Threats to Banking and Finance Webinar
First Look: 2020 Threat Detection Report
Privilege Escalation: How Attackers Level Up
MITRE ATT&CK Deep Dive: Persistence
Lateral Movement: 2-Part Webinar Series
Shutting Down Lateral Movement
ATT&CK Deep Dive: Defense Evasion
Threat Hunting with MITRE ATT&CK: 3-Part Webinar Series
Panel Discussion: 2019 Threat Detection Report
MITRE ATT&CK Deep Dive: Lateral Movement
How to use MITRE ATT&CK to mature your threat hunting program
Testing visibility to develop an innovative threat hunting program
Becoming a leader: an inside look at an advanced threat hunting program
How to Test Your Security Controls Using Atomic Red Team
5 Ways Carbon Black Response Data in Splunk Can Improve Your Security
You and what army? How lean security teams defend against evolving threats
Threat hunting for Dridex attacks using Carbon Black Response
Automating Atomic Red Team: how to scale and improve security testing
Opening the floodgates: analyzing endpoint security data
Threat hunting at scale using Carbon Black Response + Surveyor
Improving SecOps employee retention from day one
Taking Atomic Red Team to the Proving Grounds
Atomic Red Team: testing your defenses on macOS and Linux
Operationalize your threat hunt with Carbon Black Response
Security Operations for the Mid Enterprise
What is the value of your security program?
Building threat hunting into your security operations
Techniques for detecting post exploitation with EDR
From ad hoc to automated: how to operationalize threat hunting
Break through the noise: take control of your incident response program
The Ransomware Epidemic
Uniting forces: why incident response & security operations work better together
Targeted Measures to Prevent and Mitigate Ransomware
Outsourcing your endpoint detection and response
PowerShell Abuse: Good Tool Gone Bad