Webinars
-
CivStart launches startup accelerator for AI in government
KeyCaliber is among 16 startup companies to participate in CivStart’s sixth annual Govtech Accelerator Program.
-
FBI Probes Campaign Hacking Attempts
KeyCaliber's CEO discusses cybersecurity and election interference on News Nation Live with anchor Marni Hughes.
-
The Ultimate Guide to NIST CSF: Protect
The Ultimate Guide to NIST CSF: Protect is the second of 5 live webinars on the Ultimate Guide to Implementing NIST CSF.
-
The Ultimate Guide to NIST CSF: Identify
The Ultimate Guide to NIST CSF: Identify is the first of 5 live webinars on the Ultimate Guide to Implementing NIST CSF.
-
Optimizing to Make the Most of Limited Resources
Today’s security operations centers (SOCs) are inundated with an endless stream of alerts, vulnerabilities, and threat intelligence. But the reality is that no matter how large or well-resourced a security operations team, there will always be more work to do. So the next-gen SOC must be calibrated to work smarter, not harder.
-
A Top-Down View Of Cloud Risk
The migration to the cloud comes with risks and rewards. Understanding the risks early on and addressing them proactively can allow an organization to reap the benefits of the rewards without facing unreasonable risk. To assess risk effectively, organizations should take a top-down approach where they focus on the high value cloud assets first.
-
Emerging Vulnerabilities That Every Enterprise Should Know About
In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization.
-
Building the SOC of the Future
What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today’s most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC.
-
The OODA Loop for CISOs
The OODA (Observe, Orient, Decide, Act) loop is often applied to tactical security operations where the security analysts are in a constant state of evaluating and responding to alerts. But the same OODA loop can also be applied to the strategic decision-making and action-taking processes of cybersecurity executives.
Articles
Asset Management
-
Cyber Asset Attack Surface Management (CAASM)
-
8 Ways CAASM Enhances Security
-
6 Questions to Ask When Evaluating a CAASM Solution
-
Risk and Asset Management in Cybersecurity
Vulnerability Management
-
11 Patching Metrics Senior Leadership Needs to Know
-
Vulnerability Assessment Report: A C-Suite Guide
-
7 Cybersecurity Vulnerabilities and How To Mitigate Risk
-
What is the Vulnerability Management Lifecycle?
-
5 Steps to Prioritizing Vulnerabilities Efficiently
-
Vulnerabilities: Threats and Risks to Cybersecurity
-
How to Prioritize and Secure an Exploitable Vulnerability
Podcasts
-
Protecting Your Crown Jewels
Traditional risk models focus on calculating loss frequency and magnitude, but don’t go far enough in terms of modeling the most important assets in our organization, known as “Crown Jewels”.
-
Nobody Breaks Into A Bank To Steal The Posters
Security expert, Roselle Safran, joins hosts Jerich Beason & Whitney McCollum have come together after realizing more people know more about “The Queen’s Crown Jewels” than those that are vital to their company.
-
PWC Cybersecurity & Privacy Day
Silicon Luxembourg talks with the finalists of the PWC Cybersecurity & Privacy Day pitch competition.