Resource Center

The latest content focusing on how to reduce risk and strengthen your cyber posture.

ornament

Guides

Blog

The Complete Guide to Cyber Risk Quantification November 30, 2022

The Complete Guide to Cyber Risk Quantification

Learn about the essential attributes of effective cyber risk quantification models and how cyber risk quantification can improve security.

Red Team vs. Blue Team Cybersecurity: They Can Help Your Business November 10, 2022

Red Team vs. Blue Team Cybersecurity: They Can Help Your Business

Meet Ira Winkler: CYE’s Newest Field CISO November 3, 2022

Meet Ira Winkler: CYE’s Newest Field CISO

4 Key Strategies to Improve Your Company’s Cybersecurity October 24, 2022

4 Key Strategies to Improve Your Company’s Cybersecurity

Is Apache Commons Text RCE the New Log4Shell? October 20, 2022

Is Apache Commons Text RCE the New Log4Shell?

Success Stories

Webinars

Ring in the New Year with Strategic IT/OT Security play-icon
Webinar | CYE, OTORIO

Ring in the New Year with Strategic IT/OT Security

With devastating cyberattacks likely to occur in 2023, it’s crucial to learn how to establish secure IT and OT networks to protect your organization. Watch this expert panel to learn how.

400 critical vulnerabilities detected: which will attackers exploit? play-icon
Webinar | CYE, Fierce Healthcare

400 critical vulnerabilities detected: which will attackers exploit?

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

What you need to know to protect your business play-icon
Panel | Findings, CYE, CyberHive, Praxonomy, Sapphire, LSEG

What you need to know to protect your business

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

Making Security Decisions Based on Data
Product Demo

Making Security Decisions Based on Data

How to reduce your exposure, mitigate attacks, and ensure optimal use of cybersecurity resources.

Application Security in Hyper-Growth Companies
Panel | Wolt, CYE, Tinder, Snappy

Application Security in Hyper-Growth Companies

Security leaders from some of the fastest-growing app-led companies share their experience in keeping apps safe from the exponential rise of cyber risks.

Events

2022 Dallas CISO Executive Summit Nov 15, 2022

2022 Dallas CISO Executive Summit

INTERFACE Seattle 2022 Dec 1, 2022

INTERFACE Seattle 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk Oct 6, 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk Oct 11, 2022

ISMG – Private CISO Dinner: How to Quantify Cybersecurity Exposure as Business Risk

Cyber Week 2022 Jun 27, 2022

Cyber Week 2022

Cyber Talks

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nathali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min

Efficient Techniques for Quantifying Risk  play-icon
Inbar Ries and Nimrod Partush

Efficient Techniques for Quantifying Risk

Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.

Eps. 5 | 21 Min

Why is Threat Intelligence Important for EVERYONE? play-icon
Lionel Sigal and Lior Bar Lev

Why is Threat Intelligence Important for EVERYONE?

Why should every CISO integrate threat intelligence into their security plans? Listen to our experts delve into how accurate intel can save you both money and effort.

Eps. 4 | 17 Min