Videos

Join us August 11 at 2PM ET for the upcoming webinar: “The Technology Stack: Requirements, Data Acquisition, Vendor Evaluation, Analysis, RFIs”

APTs Webinar: Digital Executive Protection: Reduce Risk and Stop Attacks

APTs Legal Videocast: How Security Teams and Counsel Can Successfully Navigate the Complex Challenges of Security, Trust, and Safety

APTs Legal Videocast: Why Attribution Matters: A Legal Perspective

APTs Videocast: Nation-State Espionage Programs

APTs Legal Videocast: Capabilities of Legal Counsel During a Security Incident

APTs Videocast: Building Cyber Fusion Centers

APTs Videocast: Attribution in Cyber Threat Intelligence

APTs Legal Videocast: Actionable Legal and Technical Outcomes in Response to SolarWinds

APTs Videocast: Attribution in Security and Safety

APTs Videocast: Return on Investment of Threat Intelligence

APTs Videocast MITRE ATT&CK: How the MITRE ATT&CK Framework is Evolving to Support the Industry

APTs Videocast MITRE ATT&CK: Important Behaviors to Detect if IOCs are Easily Maneuvered Around

APTs Videocast MITRE ATT&CK: Metrics that Show Progress from Threat Intelligence Data

APTs Videocast MITRE ATT&CK: Detecting Lateral Movement Behaviors in Cloud and Virtualized Environments

APTs Videocast MITRE ATT&CK: Examples of Attackers Pivoting to the Path of Least Resistance

Full Length APTs Videocast: MITRE ATT&CK for Detecting Beyond IOCs

APTs Videocast MITRE ATT&CK: Using MITRE ATT&CK Framework for Creating Signatures of IOCs

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks