ONG-ISAC & Fortinet
During this webinar, security strategist Aamir Lakani discussed what the new year will bring as new threats emerge, old threats are recycled with new techniques, and the threat landscape continues to expand.
During this webinar, security strategist Aamir Lakani discussed what the new year will bring as new threats emerge, old threats are recycled with new techniques, and the threat landscape continues to expand.
Compliance with the new SEC cybersecurity rules were discussed in light of the recent effectiveness of the SEC’s new guidelines regarding cybersecurity disclosure.
Overview of Living Off the Land attacks, why attackers use them, some industry work in this area, examples, and how to mitigate against this threat.
Fortress Information Security defined, explored, and answered common questions on the ways Software and Hardware Bills of Materials can be used to analyze supply chain security and product vulnerabilities of energy technologies.
Join Michael Wylie and Jessica Lee from CrowdStrike’s Counter Adversary Operations, OverWatch Elite team discussed threats to the Oil and Gas vertical as seen in the rich OverWatch dataset.