Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
You know how critical a vulnerability program is to creating a strong defense against external attacks. But is your program inherently flawed?
Traditional security scanners, which rely on known, user-supplied scanning targets, are not enough to adequately manage today’s growing attack surface. While scanning known digital assets for vulnerabilities is crucial, it’s the unknown portion––shadow IT, orphaned systems, IOT devices––of the attack surface that’s being missed by traditional scanners.
According to Forrester Research’s Josh Zelonis, a modern vulnerability risk management (VRM) program must have a strong discovery capability–a process they define as “digital footprinting”. Join us for our webinar where Zelonis will share how digital footprinting is essential to next-gen vulnerability management and why he felt it was important criterion to add for The Forrester Wave™: Vulnerability Risk Management, Q4 2019.
In this webinar, you will learn:
Join us Tuesday, February 18th at 1 pm EST for our chat with guest Josh Zelonis, Principal Analyst for Security & Risk at Forrester Research and author of The Forrester Wave™: Vulnerability Risk Management, Q4 2019.
The webinar will be hosted on February 18th and 19th at:
Guest Speaker: Josh Zelonis Principal Analyst at Forrester
Josh is a principal analyst at Forrester, serving security and risk professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.
Josh Mayfield Senior Director of Security Products at RiskIQ
Josh is RiskIQ’s Senior Director of Security Products and works with RiskIQ customers to leverage technology for stronger cybersecurity and reduced risk on the attack surface. He has spent 10+ years in cybersecurity with a special focus on network security, threat hunting, identity management, and data security. His research has been featured in leading publications including, SC Magazine, Forbes, Infosec, and Dark Reading, and he is often cited by media and journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
You are now registered for “4 Keys to Digital Risk: A Conversation with Forrester Research” We look forward to having you!