Resource Center

Webinars & Videos

Ring in the New Year with Strategic IT/OT Security play icon
Webinar | CYE, OTORIO

Ring in the New Year with Strategic IT/OT Security

With devastating cyberattacks likely to occur in 2023, it’s crucial to learn how to establish secure IT and OT networks to protect your organization. Watch this expert panel to learn how.

0:58:20

400 critical vulnerabilities detected: which will attackers exploit? play icon
Webinar | CYE, Fierce Healthcare

400 critical vulnerabilities detected: which will attackers exploit?

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

0:55:07

What you need to know to protect your business play icon
Panel | Findings, CYE, CyberHive, Praxonomy, Sapphire, LSEG

What you need to know to protect your business

Cybercrime is rising in frequency and complexity and can be tricky to navigate. Watch this expert panel give best practice top tips, actionable steps to take, and review existing and future dangers.

1:28:00

Making Security Decisions Based on Data
Product Demo

Making Security Decisions Based on Data

How to reduce your exposure, mitigate attacks, and ensure optimal use of cybersecurity resources.

40:59

Application Security in Hyper-Growth Companies
Panel | Wolt, CYE, Tinder, Snappy

Application Security in Hyper-Growth Companies

Security leaders from some of the fastest-growing app-led companies share their experience in keeping apps safe from the exponential rise of cyber risks.

59:02

A Blueprint for Securing the Cloud play icon
Panel | Palo Alto, CYE, Google, Oracle

A Blueprint for Securing the Cloud

Trends & challenges in securing the cloud and how to address them, best practices for implementing a cloud strategy to protect data, and how to maintain and improve secure cloud environments.

57:30

How to Effectively Speak About Cybersecurity with Your Board play icon
Panel | SANS

How to Effectively Speak About Cybersecurity with Your Board

Managers from top-tier global private equity firms share their war stories about the challenging role of cyber due diligence in investments and acquisitions.

1:00:59

The Data Your Cyber Security Program Needs play icon
Virtual Workshop

The Data Your Cyber Security Program Needs

CYE's 4 step framework to generate strategic insights from your cyber attack data.

37:34

Breaking Down the TSA Pipeline Security Directive play icon
Panel | FBI, OTORIO

Breaking Down the TSA Pipeline Security Directive

OT security experts discuss what the TSA's regulations mean for the critical infrastructure industry and how you can convert it into a practical workplan

51:12

Enriching Security Visibility with a Scientific Approach to Cyber Risks play icon
Webinar | SANS

Enriching Security Visibility with a Scientific Approach to Cyber Risks

How can organizations adopt a scientific approach that will provide much needed context that dramatically improves risk mitigation capabilities.

1:01:00

The Biggest Mistakes Gaming CISOs are Making play icon
Webinar

The Biggest Mistakes Gaming CISOs are Making

CYE CEO Reuven Aronashvili presented three common mistakes that security leaders in online gaming and gambling companies are making.

12:44