small align text-align-left refresh


Upcoming Webinars


    Aug 22, 2018 @ 2:00PM

    Battling Lateral Movement, Counter Incident Response & Island Hopping

    According to the world’s top incident response (IR) professionals, cyberattackers are honing their ability to remain undetected inside the enterprises they’ve breached and evolving their attacks to counter defenders’ response…...

    Read More

    Aug 28, 2018 @ 2:30PM

    Live Demo of Cb Response

    The average breach takes 150 days to discover - unless your team is proactively hunting threats, detecting attacks, and shutting them down. Join a live demo of Cb Response, Carbon…...

    Read More

    Aug 28, 2018 @ 1:00PM

    Fighting Fileless Malware Attacks

    With more than 60% of today’s attacks involving fileless techniques, early detection and response is more important than ever. New variants of fileless attacks are emerging daily, requiring new approaches…...

    Read More
    Cyber Attack A10

    Aug 28, 2018 @ 12:00PM

    Office Macro Exploitation: Mitigating and Threat Hunting This Widely Exploited Vector

    If you deny attackers macros they won’t all stop attacking you; some will turn to other methods so vigilance is key and there’s no substitute for threat hunting and monitoring.…...

    Read More

    Aug 29, 2018 @ 2:00PM

    Cb Defense Live Demo Introducing Cb LiveOps!

    Now introducing Carbon Black's newest product! Cb LiveOps is a real-time security operations solution that enables organizations to ask questions of all endpoints and take action to remediate in real…...

    Read More

    Aug 30, 2018 @ 1:00PM

    Are You Ready to Threat Hunt?

    A successful threat hunting operation depends on complete visibility across the entire enterprise, including every endpoint and the unfiltered data needed to understand every process running on that endpoint. But…...

    Read More

    Sep 05, 2018 @ 2:00PM

    Live Demo of Cb Defense

    Cb Defense is Carbon Black’s next-generation AV solution. Join us to learn why legacy antivirus—even with the advancement of artificial intelligence and machine learning—is no longer enough. Every Wednesday at…...

    Read More

    Sep 06, 2018 @ 10:00AM

    The SecOps Imperative: How to Bridge the Security and Operations Gap

    According to ESG research, 72% of organizations believe that security operations were more difficult in July 2017 than they were two years earlier. This stems from security and IT operations…...

    Read More
    Protect Government IT and Comply with Federal Standards

    Sep 07, 2018 @ 11:00AM

    Democracy Under Attack: Keeping Elections & Critical Infrastructure Safe

    China, Russia, North Korea, and Iran are launching sophisticated, espionage-focused cyberattacks against the west in an effort to undermine democracy. These attacks often leverage lateral movement, counter incident response, and…...

    Read More
    Watching the business grow day by day

    Sep 12, 2018 @ 1:00PM

    How to Protect Your End-of-Life Operating Systems

    Threats such as WannaCry and Petya/NotPetya have demonstrated that hackers are more familiar with the vulnerabilities of your unsupported systems than you are. When new patches are released for new…...

    Read More

    Sep 12, 2018 @ 1:00PM

    Why Companies are Replacing AV with Advanced Endpoint Protection

    Is legacy antivirus failing to keep your endpoints secure? Perhaps you’re struggling to prevent advanced attacks, your security team is burdened by maintaining overly complex policies, or you’re facing performance…...

    Read More

    Sep 13, 2018 @ 2:00PM

    Démonstration de Cb Defense

    Cb Defense, l’Anti-Virus de nouvelle génération de Carbon Black. Joignez-vous afin de comprendre pourquoi les Anti-Virus traditionnel même avec l’avancement de l’intelligence artificielle et le machine learning n’est plus assez…...

    Read More

    Sep 14, 2018 @ 10:00AM

    Securing Plant Floor and IoT Devices Cost Effectively

    With an eye on empowering every security team and protecting every endpoint, Carbon Black stands true to our founding vision: To create a world safe from cyberattacks. In this webinar,…...

    Read More

    Sep 20, 2018 @ 1:00PM

    Using the ATT&CK Framework to Mature Your Threat Hunting Program

    Every threat hunt starts with intelligence. As one of the industry’s most comprehensive knowledge bases for adversary behavior, ATT&CK provides a structure for hunters to build their hypotheses and search…...

    Read More

    Oct 02, 2018 @ 1:00PM

    Testing Visibility to Develop an Innovative Threat Hunting Program

    Do you have the visibility you need to hunt for adversary techniques? Increasing the quality and quantity of data analysis requires a robust set of tools, techniques, and practices. Learn…...

    Read More

    Oct 18, 2018 @ 1:00PM

    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program

    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at…...

    Read More
  • Industry
  • Use Case
  • Product
Sort by:
    0 Filters Applied
    • Clear Filters