Resource Center

The latest content focusing on how to reduce risk and strengthen your cyber posture.

ornament

Guides

Blog

Why ChatGPT is an Opportunity and a Threat to Cybersecurity January 25, 2023

Why ChatGPT is an Opportunity and a Threat to Cybersecurity

ChatGPT raises important questions about its potential effects on cybersecurity. Learn more about some of the pros and cons that you should consider.

Meet a Red Team Services Leader at CYE January 18, 2023

Meet a Red Team Services Leader at CYE

Addressing the Significant Challenges of OT Environment Security January 5, 2023

Addressing the Significant Challenges of OT Environment Security

How to Perform a Cyber Risk Assessment in 2023 December 20, 2022

How to Perform a Cyber Risk Assessment in 2023

Top 5 Cybersecurity Predictions for 2023 December 15, 2022

Top 5 Cybersecurity Predictions for 2023

Success Stories

Webinars

Ring in the New Year with Strategic IT/OT Security play-icon
Webinar | CYE, OTORIO

Ring in the New Year with Strategic IT/OT Security

With devastating cyberattacks likely to occur in 2023, it’s crucial to learn how to establish secure IT and OT networks to protect your organization. Watch this expert panel to learn how.

400 critical vulnerabilities detected: which will attackers exploit? play-icon
Webinar | CYE, Fierce Healthcare

400 critical vulnerabilities detected: which will attackers exploit?

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

What you need to know to protect your business play-icon
Panel | Findings, CYE, CyberHive, Praxonomy, Sapphire, LSEG

What you need to know to protect your business

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

Making Security Decisions Based on Data
Product Demo

Making Security Decisions Based on Data

How to reduce your exposure, mitigate attacks, and ensure optimal use of cybersecurity resources.

Application Security in Hyper-Growth Companies
Panel | Wolt, CYE, Tinder, Snappy

Application Security in Hyper-Growth Companies

Security leaders from some of the fastest-growing app-led companies share their experience in keeping apps safe from the exponential rise of cyber risks.

Events

2022 Dallas CISO Executive Summit Nov 15, 2022

2022 Dallas CISO Executive Summit

INTERFACE Seattle 2022 Dec 1, 2022

INTERFACE Seattle 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk Oct 6, 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk Oct 11, 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk

Cyber Week 2022 Jun 27, 2022

Cyber Week 2022

Cyber Talks

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nafthali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min

Efficient Techniques for Quantifying Risk  play-icon
Inbar Ries and Nimrod Partush

Efficient Techniques for Quantifying Risk

Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.

Eps. 5 | 21 Min

Why is Threat Intelligence Important for EVERYONE? play-icon
Lionel Sigal and Lior Bar Lev

Why is Threat Intelligence Important for EVERYONE?

Why should every CISO integrate threat intelligence into their security plans? Listen to our experts delve into how accurate intel can save you both money and effort.

Eps. 4 | 17 Min